{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T06:05:52Z","timestamp":1760249152481},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649519"},{"type":"electronic","value":"9783540539186"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055490","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T05:10:06Z","timestamp":1153977006000},"page":"296-308","source":"Crossref","is-referenced-by-count":5,"title":["A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem"],"prefix":"10.1007","author":[{"given":"Shingo","family":"Miyazaki","sequence":"first","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"22_CR1","unstructured":"M. Abe, J. Camenisch, \u201cPartially Blind Signature Schemes,\u201d Proceedings of the 1997 Symposium on Cryptography and Information Security, SCIS97-33D, 1997."},{"key":"22_CR2","first-page":"244","volume":"1163","author":"M. Abe","year":"1996","unstructured":"M. Abe, E. Fujisaki, \u201cHow to Date Blind Signatures,\u201d Advances in Cryptology \u2014 ASACRYPT '96, LNCS 1163, pp. 244\u2013251, 1996.","journal-title":"LNCS"},{"key":"22_CR3","first-page":"302","volume":"773","author":"S. Brands","year":"1994","unstructured":"S. Brands, \u201cUntraceable off-line cash in wallet with observers,\u201d In Advances in Cryptology \u2014 CRYPTO '93, LNCS 773, pp. 302\u2013318, 1994.","journal-title":"LNCS"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"S. Brands, \u201cOff-Line Electronic Cash Based on Secret-KeyCertificates,\u201d Proceedings of the Second International Symposium of Latin American Theoretical Informatics, 1995. http:\/\/www.cwi.nl\/cwi\/publications\/CS-R9506.ps.Z","DOI":"10.1007\/3-540-59175-3_86"},{"key":"22_CR5","first-page":"231","volume":"921","author":"S. Brands","year":"1995","unstructured":"S. Brands, \u201cRestrictive Binding of Secret-Key Certificates,\u201d Advances in Cryptology \u2014 EUROCRYPT '95, LNCS 921, pp.231\u2013247, 1995.","journal-title":"LNCS"},{"key":"22_CR6","first-page":"276","volume":"1163","author":"A. Chan","year":"1996","unstructured":"A. Chan, Y. Frankel, P. MacKenzie, Y. Tsiounis, \u201cMis-representation of Identities in E-cash Schemes and how to Prevent it,\u201d Advances in Cryptology \u2014 ASIACRYPT '96, LNCS 1163, pp. 276\u2013285, 1996.","journal-title":"LNCS"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat, M. Naor, \u201cUntraceable Electronic Cash,\u201d In Advances in Cryptology \u2014 CRYPTO '88, pp. 319\u2013327, 1988.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"D. Chaum, \u201cBlind Signature for Untraceable Payments,\u201d In Advances in Cryptology \u2014 CRYPTO '82, pp. 199\u2013203, 1983.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"22_CR9","first-page":"428","volume":"950","author":"J. Camenisch","year":"1994","unstructured":"J. Camenisch, J. M. Piveteau, M. Stadler\u2204B!\u2204(B \u201cBlind Signatures Based on the Discrete Logarithm Problem,\u201d Advances in Cryptology \u2014 EUROCRYPT '94, LNCS 950, pp. 428\u2013432, 1994.","journal-title":"LNCS"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"T. ElGamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms,\u201d IEEE Transactions on Information Theory, pp. 469\u2013472, 1985.","DOI":"10.1109\/TIT.1985.1057074"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"M. K. Franklin, M. Yung \u201cSecure and Efficient Off-line Digital Money,\u201d Proceedings of ICALP '93, 1993.","DOI":"10.1007\/3-540-56939-1_78"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"O. Goldreich, S. Micali, A. Wigderson, \u201cProofs that yield nothing but their validity and a methodology of cryptographic protocol design,\u201d Proceedings of IEEE FOCS '86, p.174\u2013187, 1986.","DOI":"10.1109\/SFCS.1986.47"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"P. Horster, M. Michels, H. Petersen, \u201cMeta-ElGamal signature schemes,\u201d Proceedings of 2nd ACM CCS manuscript, pp. 96\u2013107, 1994.","DOI":"10.1145\/191177.191197"},{"key":"22_CR14","first-page":"224","volume":"917","author":"P. Horster","year":"1994","unstructured":"P. Horster, M. Michels, H. Petersen, \u201cMeta Message Recovery and Meta Blind signature schemes based on the discrete logarithm problem and their applications,\u201d Advances in Cryptology \u2014 ASIACRYPT '94, LNCS 917, pp. 224\u2013237, 1994.","journal-title":"LNCS"},{"key":"22_CR15","unstructured":"S. Miyazaki, M. Abe, K. Sakurai, \u201cPartially Blind Signature Schemes for the DSS and for a Discrete Log. based Message Recovery Signature,\u201d Proceedings of the 1997 Korea-Japan Joint Workshop on Information Security and Cryptology, pp. 217\u2013226, 1997."},{"key":"22_CR16","unstructured":"NIST FIPS PUB XX, Digital Signature Standard(DSS), National Institute of Standards and Technology, U.S. Department of Commerce, DRAFT, 1993."},{"key":"22_CR17","unstructured":"K. Q. Nguyen, Y. Mu, V. Varadharajan, \u201cA new digital cash scheme based on blind Nyberg-Rueppel digital signature,\u201d Pre-Proceedings of 1997 Information Security Workshop, pp. 219\u2013226, 1997."},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"K. Nyberg, R. A. Rueppel, \u201cA new signature scheme based on the DSA giving message recovery,\u201d Proceedings of 1st ACM CCS manuscript, 1993.","DOI":"10.1145\/168588.168595"},{"key":"22_CR19","first-page":"252","volume":"1163","author":"D. Pointcheval","year":"1996","unstructured":"D. Pointcheval, J. Stern, \u201cProvably Secure Blind Signature Schemes,\u201d Advances in Cryptology \u2014 ASIACRYPT '96, LNCS 1163, pp. 252\u2013265, 1996.","journal-title":"LNCS"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"C. P. Schnorr, \u201cEfficient signature generation by smart cards,\u201d Journal of Cryptology, pp. 161\u2013174, 1991.","DOI":"10.1007\/BF00196725"},{"key":"22_CR21","unstructured":"B. Schoenmakers, \u201cAn efficient electronic payment system with standing parallel attacks,\u201d Technical report, CWI, 1995. http:\/\/www.cwi.n1\/ftp\/CWIreports\/AA\/CSR9522.ps.Z"},{"key":"22_CR22","first-page":"153","volume":"917","author":"Y. Yacobi","year":"1994","unstructured":"Y. Yacobi, \u201cEfficient electronic money,\u201d Advances in Cryptology \u2014 ASIACRYPT '94, LNCS 917, pp. 153\u2013163, 1994.","journal-title":"LNCS"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T04:34:46Z","timestamp":1555734886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/bfb0055490","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}