{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T03:13:40Z","timestamp":1778296420282,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540649519","type":"print"},{"value":"9783540539186","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055489","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T09:10:06Z","timestamp":1153991406000},"page":"275-295","source":"Crossref","is-referenced-by-count":17,"title":["An efficient fair off-line electronic cash system with extensions to checks and wallets with observers"],"prefix":"10.1007","author":[{"given":"Aymeric","family":"de Solages","sequence":"first","affiliation":[]},{"given":"Jacques","family":"Traor\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"21_CR1","unstructured":"B. den Boer, D. Chaum, E. van Heyst, S. Mjolsnes and A. Steenbeek, Efficient Off-Line Electronic Checks, Proceedings of EUROCRYPT'89, Lecture Notes in Computer Science, Vol 434, Springer-Verlag, pp. 294\u2013301."},{"key":"21_CR2","unstructured":"S. Brands, An Efficient Off-Line Electronic Cash System based on the Representation Problem, Technical Report CS-R9323, CWI, April 1993."},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"S. Brands, Untraceable Off-Line Cash in Wallets with Observers, Proceedings of CRYPTO'93, Lecture Notes in Computer Science, Vol 773, Springer-Verlag, pp. 302\u2013318.","DOI":"10.1007\/3-540-48329-2_26"},{"key":"21_CR4","unstructured":"E. Brickell, P. Gemmel and D. Kravitz, Trustee-Based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change, Proceedings of the 6th Annual Symposium on Discrete Algorithm, pp. 457\u2013466, Jan 1995."},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"J. Camenisch, U. Maurer and M. Stadler, Digital Payment Systems with Passive Anonymity-Revoking Trustees, Proceedings of ESORICS'96, Lecture Notes in Computer Science, Vol 1146, Springer-Verlag, pp. 33\u201343.","DOI":"10.1007\/3-540-61770-1_26"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"J. Camenisch, U. Maurer and M. Stadler, Digital Payment Systems with Passive Anonymity-Revoking Trustees, Journal of Computer Security, volume 5, number 1, IOS Press, 1997.","DOI":"10.3233\/JCS-1997-5104"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"D. Chaum, Blind Signatures for Untraceable Payments, Proceedings of CRYPTO'82, Plenum Press, 1983, pp. 199\u2013203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat and M. Naor, Untraceable Electronic Cash, Proceedings of CRYPTO'88, Lecture Notes in Computer Science, Vol 403, Springer-Verlag, pp. 319\u2013327.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"D. Chaum and T. Pedersen, Wallet Databases with Observers, Proceedings of CRYPTO'92, Lecture Notes in Computer Science, Vol 740, Springer-Verlag, pp. 89\u2013105.","DOI":"10.1007\/3-540-48071-4_7"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"R. Cramer and T. Pedersen, Improved Privacy in Wallets with Observers, Proceedings of EUROCRYPT'93, Lecture Notes in Computer Science, Vol 765, Springer-Verlag, pp. 329\u2013343.","DOI":"10.1007\/3-540-48285-7_29"},{"key":"21_CR11","unstructured":"G. Davida, Y. Frankel, Y. Tsiounis and M. Yung, Anonymity Control in E-Cash Systems, Financial Cryptography'97, Anguilla, British West Indies, February 24\u201327."},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"T. ElGamal, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, Proceedings of CRYPTO'84, Lecture Notes in Computer Science, Vol 196, Springer-Verlag, pp. 10\u201318.","DOI":"10.1007\/3-540-39568-7_2"},{"issue":"2","key":"21_CR13","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF02351717","volume":"1","author":"U. Feige","year":"1988","unstructured":"U. Feige, A. Fiat and A. Shamir, Zero Knowledge Proofs of Identity, Journal of Cryptology, 1 (2), pp. 77\u201394, 1988.","journal-title":"Journal of Cryptology"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Y. Frankel, Y. Tsiounis and M. Yung, Indirect Discourse Proofs: Achieving Fair Off-Line Electronic Cash, Proceedings of ASIACRYPT'96, Lecture Notes in Computer Science, Vol 1163, Springer-Verlag, pp. 286\u2013300.","DOI":"10.1007\/BFb0034855"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"R. Hirschfeld, Making Electronic Refunds Safer, Proceedings of CRYPTO'92, Lecture Notes in Computer Science, Vol 740, Springer-Verlag, pp. 106\u2013112.","DOI":"10.1007\/3-540-48071-4_8"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"T. Okamoto, Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, Proceedings of CRYPTO'92, Lecture Notes in Computer Science, Vol 740, Springer-Verlag, pp. 31\u201353.","DOI":"10.1007\/3-540-48071-4_3"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"T. Okamoto and K. Ohta, Divertible Zero-Knowledge Interactive Proofs and Commutative Random Self-Reducibility, Proceedings of EUROCRYPT'89, Lecture Notes in Computer Science, Vol 434, Springer-Verlag, pp. 481\u2013496.","DOI":"10.1007\/3-540-46885-4_16"},{"issue":"3","key":"21_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1991","unstructured":"C.P. Schnorr, Efficient Signature Generation by Smart Cards, Journal of Cryptology, 4(3), pp. 161\u2013174, 1991.","journal-title":"Journal of Cryptology"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"M. Stadler, J.M. Piveteau and J. Camenisch, Fair Blind Signatures, Proceedings of EUROCRYPT'95, Lecture Notes in Computer Science, Vol 921, Springer-Verlag, pp. 209\u2013219.","DOI":"10.1007\/3-540-49264-X_17"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"J. Traor\u00e9, Making Unfair a \u2018Fair\u2019 Blind Signature Scheme, Proceedings of ICICS'97, Lecture Notes in Computer Science, Vol 1334, Springer-Verlag, pp. 386\u2013397.","DOI":"10.1007\/BFb0028494"},{"key":"21_CR21","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","volume":"11","author":"S. Solms von","year":"1992","unstructured":"S. von Solms and D. Naccache, On Blind Signatures and Perfect Crimes, Computer & Security, 11, 1992, pp. 581\u2013583.","journal-title":"Computer & Security"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T08:34:48Z","timestamp":1555749288000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055489"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/bfb0055489","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}