{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T20:01:37Z","timestamp":1778788897461,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540649519","type":"print"},{"value":"9783540539186","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055483","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T09:10:06Z","timestamp":1153991406000},"page":"184-197","source":"Crossref","is-referenced-by-count":102,"title":["Group blind digital signatures: A scalable solution to electronic cash"],"prefix":"10.1007","author":[{"given":"Anna","family":"Lysyanskaya","sequence":"first","affiliation":[]},{"given":"Zulfikar","family":"Ramzan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"15_CR1","first-page":"62","volume-title":"Random oracles are practical: A paradigm for designing efficient protocols","author":"M. Bellare","year":"1993","unstructured":"Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In First ACM Conference on Computer and Communications Security, pages 62\u201373, Fairfax, 1993. ACM."},{"key":"15_CR2","unstructured":"Stefan Brands. An efficient off-line electronic cash system based on the representation problem. Technical Report CS-R9323, CWI, April 1993."},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Jan Camenisch. Efficient and generalized group signatures. In Proc. EUROCRYPT 97, pages 465\u2013479. Springer-Verlag, 1997. Lecture Notes in Computer Science No. 1233.","DOI":"10.1007\/3-540-69053-0_32"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Jan Camenisch, Ueli Maurer, and Markus Stadler. Digital payment systems with passive anonymity-revoking trustees. Journal of Computer Security, 5(1), 1997.","DOI":"10.3233\/JCS-1997-5104"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Markus Stadler. Efficient group signatures for large groups. In Proc. CRYPTO 97, pages 410\u2013424. Springer-Verlag, 1997. Lecture Notes in Computer Science No. 1294.","DOI":"10.1007\/BFb0052252"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In S. Goldwasser, editor, Proc. CRYPTO 88, pages 319\u2013327. Springer-Verlag, 1988. Lecture Notes in Computer Science No. 403.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"15_CR7","first-page":"199","volume-title":"Proc. CRYPTO 82","author":"D. Chaum","year":"1983","unstructured":"David Chaum. Blind signatures for untraceable payments. In R. L. Rivest, A. Sherman, and D. Chaum, editors, Proc. CRYPTO 82, pages 199\u2013203, New York, 1983. Plenum Press."},{"key":"15_CR8","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-1-4684-4730-9_14","volume-title":"Proc. CRYPTO 83","author":"D. Chaum","year":"1984","unstructured":"David Chaum. Blind signature system. In D. Chaum, editor, Proc. CRYPTO 83, pages 153\u2013153, New York, 1984. Plenum Press."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"David Chaum and Eug\u00e8ne van Heyst. Group signatures. In Proc. EUROCRYPT 91, pages 257\u2013265. Springer-Verlag, 1991. Lecture Notes in Computer Science No. 547.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"L. Chen and T. P. Pedersen. New group signature schemes (extended abstract). In Proc. EUROCRYPT 94, pages 171\u2013181. Springer-Verlag, 1994. Lecture Notes in Computer Science No. 547.","DOI":"10.1007\/BFb0053433"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Amos Fiat and Adi Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A.M. Odlyzko, editor, Proc. CRYPTO 86, pages 186\u2013194. Springer-Verlag, 1987. Lecture Notes in Computer Science No. 263.","DOI":"10.1007\/3-540-47721-7_12"},{"issue":"1","key":"15_CR12","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. SIAM. J. Computing, 18(1):186\u2013208, February 1989.","journal-title":"SIAM. J. Computing"},{"issue":"2","key":"15_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Computing, 17(2):281\u2013308, April 1988.","journal-title":"SIAM J. Computing"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"A. Juels, M. Luby, and R. Ostrovsky. Security of blind digital signatures. In Proc. CRYPTO 97, Lecture Notes in Computer Science, pages 150\u2013164. Springer-Verlag, 1997. Lecture Notes in Computer Science No. 1294.","DOI":"10.1007\/BFb0052233"},{"key":"15_CR15","unstructured":"Laurie Law, Susan Sabett, and Jerry Solinas. How to make a mint: the cryptography of anonymous electronic cash. National Security Agency, Office of Information Security Research and Technology, Cryptology Division, June 1996."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"David Pointcheval and Jacques Stern. Provably secure blind signature schemes. In M.Y. Rhee and K. Kim, editors, Advances in Cryptology-ASIACRYPT '96, pages 252\u2013265. Springer-Verlag, 1996. Lecture Notes in Computer Science No. 1163.","DOI":"10.1007\/BFb0034852"},{"issue":"2","key":"15_CR17","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"key":"15_CR18","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1993","unstructured":"B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, New York, 1993."},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"C. P. Schnorr. Efficient identification and signatures for smart cards. In G. Brassard, editor, Proc. CRYPTO 89, pages 239\u2013252. Springer-Verlag, 1990. Lecture Notes in Computer Science No. 435.","DOI":"10.1007\/0-387-34805-0_22"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Daniel R. Simon. Anonymous communication and anonymous cash. In Neal Koblitz, editor, Proc. CRYPTO 96, pages 61\u201373. Springer-Verlag, 1996. Lecture Notes in Computer Science No. 1109.","DOI":"10.1007\/3-540-68697-5_5"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Peter Wayner. Digital Cash: Commerce on the Net. Academic Press, 1996.","DOI":"10.1016\/B978-0-12-738765-9.50020-4"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T14:02:21Z","timestamp":1587132141000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055483"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/bfb0055483","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}