{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T14:32:43Z","timestamp":1718461963377},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,11,19]],"date-time":"2009-11-19T00:00:00Z","timestamp":1258588800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2010,2]]},"DOI":"10.1007\/s10207-009-0094-1","type":"journal-article","created":{"date-parts":[[2009,11,18]],"date-time":"2009-11-18T09:16:48Z","timestamp":1258535808000},"page":"33-50","source":"Crossref","is-referenced-by-count":8,"title":["Temporarily hidden bit commitment and lottery applications"],"prefix":"10.1007","volume":"9","author":[{"given":"David M.","family":"Goldschlag","sequence":"first","affiliation":[]},{"given":"Stuart G.","family":"Stubblebine","sequence":"additional","affiliation":[]},{"given":"Paul F.","family":"Syverson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,11,19]]},"reference":[{"key":"94_CR1","unstructured":"Abadi, M., Lomas, M.A., Needham, R.: Strengthening passwords. Technical note 1997-033, SRC, 1997. Published Sept. 4, 1997 (with minor revisions on Dec. 16, 1997) (1997)"},{"key":"94_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogoway, P.: Optimal asymmetric encryption. In: Advances in Cryptologoy\u2014CRYPTO \u201994, pp. 92\u2013111. Springer-Verlag, LNCS 950 (1995)","DOI":"10.1007\/BFb0053428"},{"key":"94_CR3","doi-asserted-by":"crossref","unstructured":"Boneh, D., Naor, M.: Timed commitments (extended abstract). In: Advances in Cryptology\u2014CRYPTO 2000, pp. 236\u2013254. Springer-Verlag, LNCS 1880 (2000)","DOI":"10.1007\/3-540-44598-6_15"},{"key":"94_CR4","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Syverson, P.: Reliable MIX cascade networks through reputation. In: Matt Blaze (ed.) Financial Cryptography: FC 2002, 6th Interntaional Conference, Revised Papers, pp. 253\u2013268. Springer-Verlag, LNCS 2357 (2003)","DOI":"10.1007\/3-540-36504-4_18"},{"key":"94_CR5","doi-asserted-by":"crossref","unstructured":"Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography. In: 23rd ACM Symposium on the Theory of Computing, pp. 542\u2013552. Full version available from authors (1991)","DOI":"10.1145\/103418.103474"},{"key":"94_CR6","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Technical Report CS95-20, Weizmann Institute, pp. 139\u2013147. Preliminary version in CRYPTO \u201992 (1995)","DOI":"10.1007\/3-540-48071-4_10"},{"key":"94_CR7","doi-asserted-by":"crossref","unstructured":"Fouque, P.-A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) Financial Cryptography: 4th International Conference, FC 2000, Proceedings, pp. 90\u2013104. Springer-Verlag, LNCS 1962 (2001)","DOI":"10.1007\/3-540-45472-1_7"},{"key":"94_CR8","doi-asserted-by":"crossref","unstructured":"Franklin, M.K., Malkhi, D.: Auditable metering with lightweight security. In: Hirschfeld, R. (ed.) Financial Cryptography: FC \u201897, Proceedings, pp. 151\u2013160. Springer-Verlag, LNCS 1318 (1998)","DOI":"10.1007\/3-540-63594-7_75"},{"key":"94_CR9","doi-asserted-by":"crossref","unstructured":"Garay, J.A., Jakobsson, M.: Timed release of standard digital signatures (extended abstract). In: Blaze, M. (ed.) Financial Cryptography: FC 2002, 6th International Conference, Revised Papers, pp. 168\u2013182. Springer-Verlag, LNCS 2357 (2003)","DOI":"10.1007\/3-540-36504-4_13"},{"key":"94_CR10","doi-asserted-by":"crossref","unstructured":"Goldschlag, D.M., Stubblebine, S.G.: Publicly verifiable lotteries: applications of delaying functions. In: Hirschfeld, R. (ed.) Financial Cryptography: FC \u201998, Proceedings, pp. 214\u2013226. Springer-Verlag, LNCS 1465 (1998)","DOI":"10.1007\/BFb0055485"},{"key":"94_CR11","doi-asserted-by":"crossref","unstructured":"Kelsey, J., Schneier, B., Hall, C., Wagner, D.: Secure applications of low-entropy keys. In: Information Security Workshop (ISW\u201897), Ishikawa Japan, September (1997)","DOI":"10.1007\/BFb0030415"},{"key":"94_CR12","unstructured":"Krawczyk, H., Rabin, T.: Chameleon hashing and signatures. In: Proceedings of NDSS 2000, pp. 143\u2013154 (2000)"},{"issue":"2","key":"94_CR13","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/0167-4048(96)00003-X","volume":"15","author":"U. Manber","year":"1996","unstructured":"Manber U.: A simple scheme to make passwords based on one-way functions much harder to crack. Comput. Secur. 15(2), 171\u2013176 (1996)","journal-title":"Comput. Secur."},{"key":"94_CR14","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes A., van Oorschot P., Vanstone S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"issue":"4","key":"94_CR15","first-page":"284","volume":"21","author":"M. Ralph","year":"1978","unstructured":"Ralph M.: Secure communications over insecure channels. Commun ACM 21(4), 284\u2013299 (1978) April","journal-title":"Commun ACM"},{"key":"94_CR16","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: Electronic lottery tickets as micropayments. In: Hirschfeld, R. (ed.) Financial Cryptography: FC \u201897, Proceedings, pp. 307\u2013314. Springer-Verlag, LNCS 1318 (1998)","DOI":"10.1007\/3-540-63594-7_87"},{"key":"94_CR17","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Technical Memo MIT\/LCS\/TR-684, MIT LCS, February (1996)"},{"key":"94_CR18","volume-title":"Coding and Information Theory, volume 134 of Graduate Texts in Mathematics","author":"S. Roman","year":"1992","unstructured":"Roman S.: Coding and Information Theory, volume 134 of Graduate Texts in Mathematics. Springer, New York (1992)"},{"key":"94_CR19","volume-title":"Applied Cryptography, Second Edition: Protocols, Algorithms and Source Code in C","author":"B. Schneier","year":"1996","unstructured":"Schneier B.: Applied Cryptography, Second Edition: Protocols, Algorithms and Source Code in C. Wiley, New York (1996)"},{"key":"94_CR20","doi-asserted-by":"crossref","unstructured":"Stubblebine, S., Syverson, P.: Authentic attributes with fine-grained anonymity protection. In: Frankel, Y. (ed.) Financial Cryptography: 4th International Conference, FC 2000, Proceedings, pp. 276\u2013294. Springer-Verlag, LNCS 1962 (2001)","DOI":"10.1007\/3-540-45472-1_19"},{"key":"94_CR21","doi-asserted-by":"crossref","unstructured":"Syverson, P.: Weakly secret bit commitment: applications to lotteries and fair exchange. In: 1998 Computer Security Foundations Workshop (CSFW11), Proceedings, pp. 2\u201313, Rockport Massachusetts, June (1998)","DOI":"10.21236\/ADA464109"},{"key":"94_CR22","doi-asserted-by":"crossref","unstructured":"Webster, A.F., Tavares, S.E.: On the design of s-boxes. In: Advances in Cryptology\u2014CRYPTO \u201985, pp. 523\u2013534. Springer-Verlag, LNCS 218 (1986)","DOI":"10.1007\/3-540-39799-X_41"},{"key":"94_CR23","doi-asserted-by":"crossref","unstructured":"Wheeler, D.: Transactions using bets. In: Lomas, M. (ed.) Security Protocols: 4th International Workshop, pp. 89\u201392 (1996)","DOI":"10.1007\/3-540-62494-5_7"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0094-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-009-0094-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-009-0094-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:01:24Z","timestamp":1559127684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-009-0094-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,19]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,2]]}},"alternative-id":["94"],"URL":"https:\/\/doi.org\/10.1007\/s10207-009-0094-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,11,19]]}}}