{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T21:32:20Z","timestamp":1648762340610},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1007\/s10207-011-0152-3","type":"journal-article","created":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T12:10:12Z","timestamp":1322741412000},"page":"53-63","source":"Crossref","is-referenced-by-count":8,"title":["A new efficient optimistic fair exchange protocol without random oracles"],"prefix":"10.1007","volume":"11","author":[{"given":"Qiong","family":"Huang","sequence":"first","affiliation":[]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,12,1]]},"reference":[{"key":"152_CR1","doi-asserted-by":"crossref","unstructured":"Asokan, N., Schunter, M., Waidner, M.: Optimistic protocols for fair exchange. In: ACM Conference on Computer and Communications Security, pp. 7\u201317. ACM (1997)","DOI":"10.1145\/266420.266426"},{"key":"152_CR2","doi-asserted-by":"crossref","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures (extended abstract). In: Advances in Cryptology\u2014EUROCRYPT 98, Lecture Notes in Computer Science, vol. 1403, pp. 591\u2013606. Springer, Berlin (1998)","DOI":"10.1007\/BFb0054156"},{"issue":"4","key":"152_CR3","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1109\/49.839935","volume":"18","author":"N. Asokan","year":"2000","unstructured":"Asokan N., Shoup V., Waidner M.: Optimistic fair exchange of digital signatures. IEEE J. Sel. Areas Commun. 18(4), 593\u2013610 (2000)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"152_CR4","doi-asserted-by":"crossref","unstructured":"Bao, F., Wang, G., Zhou, J., Zhu, H.: Analysis and improvement of Micali\u2019s fair contract signing protocol. In: Proceedings of 9th Australasian Conference on Information Security and Privacy, ACISP 2004, Lecture Notes in Computer Science, vol. 3108, pp. 176\u2013187. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-27800-9_16"},{"key":"152_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Boldyreva, A., Micali, S.: Public-key encryption in a multi-user setting: security proofs and improvements. In: Advances in Cryptology\u2014EUROCRYPT 2000, Lecture Notes in Computer Science, vol. 1807, pp. 259\u2013274. Springer, Berlin (2000)","DOI":"10.1007\/3-540-45539-6_18"},{"key":"152_CR6","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp. 62\u201373. ACM (1993)","DOI":"10.1145\/168588.168596"},{"key":"152_CR7","doi-asserted-by":"crossref","unstructured":"Bender, A., Katz, J., Morselli, R.: Ring signatures: stronger definitions, and constructions without random oracles. In: Proceedings of 3rd IACR Theory of Cryptography Conference, TCC 2006, Lecture Notes in Computer Science, vol. 3876, pp. 60\u201379. Springer, Berlin. Also at Cryptology ePrint Archive, Report 2005\/304 (2006)","DOI":"10.1007\/11681878_4"},{"key":"152_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: Advances in Cryptology\u2014EUROCRYPT 2004, Lecture Notes in Computer Science, vol. 3027, pp. 56\u201373. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"152_CR9","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Advances in Cryptology\u2014EUROCRYPT 2003, Lecture Notes in Computer Science, vol. 2656, pp. 416\u2013432. Springer, Berlin (2003)","DOI":"10.1007\/3-540-39200-9_26"},{"key":"152_CR10","doi-asserted-by":"crossref","unstructured":"Boyen, X.: Mesh signatures: how to leak a secret with unwitting and unwilling participants. In: Advances in Cryptology\u2014EUROCRYPT 2007, Lecture Notes in Computer Science, vol. 4515, pp. 210\u2013227. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-72540-4_12"},{"key":"152_CR11","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Damg\u00e5rd, I.: Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In: Advances in Cryptology\u2014ASIACRYPT 2000, Lecture Notes in Computer Science, vol. 1976, pp. 331\u2013345. Springer, Berlin (2000)","DOI":"10.1007\/3-540-44448-3_25"},{"key":"152_CR12","doi-asserted-by":"crossref","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. In: Proceedings of 30th ACM Symposium on Theory of Computing, pp. 209\u2013218. ACM (1998)","DOI":"10.1145\/276698.276741"},{"key":"152_CR13","unstructured":"Chandran, N., Groth, J., Sahai, A.: Ring signatures of sub-linear size without random oracles. In: Proceedings of 34th International Colloquium on Automata, Languages and Programming, ICALP 2007, Lecture Notes in Computer Science, vol. 4596, pp. 423\u2013434. Springer, (2007)"},{"key":"152_CR14","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Lee, P.J., Yum, D.H.: Optimistic fair exchange in a multi-user setting. In: Proceedings of Public Key Cryptography 2007, Lecture Notes in Computer Science, vol. 4450, pp. 118\u2013133. Springer, Berlin. Also at Cryptology ePrint Archive, Report 2007\/182 (2007)","DOI":"10.1007\/978-3-540-71677-8_9"},{"key":"152_CR15","doi-asserted-by":"crossref","unstructured":"Dodis Y., Reyzin, L.: Breaking and repairing optimistic fair exchange from PODC 2003. In: ACM Workshop on Digital Rights Management, DRM 2003, pp. 47\u201354. ACM (2003)","DOI":"10.1145\/947386.947387"},{"key":"152_CR16","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Yum, D.H.: Time capsule signatures. In: Proceedings of Financial Cryptography and Data Security 2005, Lecture Notes in Computer Science, vol. 3570, pp. 57\u201371. Springer, Berlin (2005)","DOI":"10.1007\/11507840_6"},{"issue":"4","key":"152_CR17","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/TDSC.2005.40","volume":"2","author":"P.D. Ezhilchelvan","year":"2005","unstructured":"Ezhilchelvan P.D., Shrivastava S.K.: A family of trusted third party based fair-exchange protocols. IEEE Trans. Dependable Secure Comput. 2(4), 273\u2013286 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"5","key":"152_CR18","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/S0020-0190(01)00338-6","volume":"83","author":"S. Galbraith","year":"2002","unstructured":"Galbraith S., Malone-Lee J., Smart N.: Public key signatures in the multi-user setting. Inf. Process. Lett. 83(5), 263\u2013266 (2002)","journal-title":"Inf. Process. Lett."},{"issue":"2","key":"152_CR19","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser S., Micali S., Rivest R.: A digital signature scheme secure against adaptive chosen-message attack. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"152_CR20","doi-asserted-by":"crossref","unstructured":"Hu, B.C., Wong, D.S., Huang, Q., Yang, G., Deng, X.: Time capsule signature: Efficient and provably secure constructions. In: Proceedings of 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Lecture Notes in Computer Science, vol. 4582, pp. 126\u2013142. Springer, Berlin. Full paper is available at Cryptology ePrint Archive, Report 2007\/146 (2007)","DOI":"10.1007\/978-3-540-73408-6_9"},{"key":"152_CR21","doi-asserted-by":"crossref","unstructured":"Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Ambiguous optimistic fair exchange. In: Advances in Cryptology\u2014ASIACRYPT 2008, Lecture Notes in Computer Science, vol. 5350, pp. 74\u201389. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-89255-7_6"},{"key":"152_CR22","doi-asserted-by":"crossref","unstructured":"Huang, Q., Yang, G., Wong, D.S., Susilo, W.: Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles. In: Proceedings of Topics in Cryptology\u2014CT-RSA 2008, Lecture Notes in Computer Science, vol. 4964, pp. 106\u2013120. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-79263-5_7"},{"key":"152_CR23","unstructured":"Kremer, S.: Formal Analysis of Optimistic Fair Exchange Protocols. PhD thesis, Universit\u00e9 Libre de Bruxelles (2003)"},{"key":"152_CR24","doi-asserted-by":"crossref","unstructured":"Libert, B., Quisquater, J.-J.: Practical time capsule signatures in the standard model from bilinear maps. In: Proceedings of 1st International Conference on Pairing-Based Cryptography, Pairing 2007, Lecture Notes in Computer Science, vol. 4575, pp. 23\u201338. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-73489-5_3"},{"key":"152_CR25","doi-asserted-by":"crossref","unstructured":"Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures and multisignatures without random oracles. In: Advances in Cryptology\u2014EUROCRYPT 2006, Lecture Notes in Computer Science, vol. 4004, pp. 465\u2013485. Springer, Berlin (2006)","DOI":"10.1007\/11761679_28"},{"key":"152_CR26","doi-asserted-by":"crossref","unstructured":"Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: Advances in Cryptology\u2014EUROCRYPT 2004, Lecture Notes in Computer Science, vol. 3027, pp. 74\u201390. Springer, Berlin (2004)","DOI":"10.1007\/978-3-540-24676-3_5"},{"key":"152_CR27","doi-asserted-by":"crossref","unstructured":"Micali, S.: Simple and fast optimistic protocols for fair electronic exchange. In: ACM Symposium on Principles of Distributed Computing, PODC 2003, pp. 12\u201319. ACM (2003)","DOI":"10.1145\/872035.872038"},{"key":"152_CR28","doi-asserted-by":"crossref","unstructured":"Park, J.M., Chong, E.K., Siegel, H.J.: Constructing fair-exchange protocols for e-commerce via distributed computation of RSA signatures. In: PODC 2003, pp. 172\u2013181. ACM (2003)","DOI":"10.1145\/872035.872060"},{"key":"152_CR29","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret. In: Advances in Cryptology\u2014ASIACRYPT 2001, Lecture Notes in Computer Science, vol. 2248, pp. 552\u2013565. Springer, Berlin (2001)","DOI":"10.1007\/3-540-45682-1_32"},{"key":"152_CR30","doi-asserted-by":"crossref","unstructured":"Shacham, H., Waters, B.: Efficient ring signatures without random oracles. In: Proceedings of Public Key Cryptography 2007, Lecture Notes in Computer Science, vol. 4450, pp. 166\u2013180. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-71677-8_12"},{"key":"152_CR31","doi-asserted-by":"crossref","unstructured":"Wang, G.: An abuse-free fair contract signing protocol based on the RSA signature. In: Proceedings of 14th International Conference on World Wide Web, WWW 2005, pp. 412\u2013421. ACM (2005)","DOI":"10.1145\/1060745.1060807"},{"key":"152_CR32","doi-asserted-by":"crossref","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Advances in Cryptology\u2014EUROCRYPT 2005, Lecture Notes in Computer Science, vol. 3494, pp. 114\u2013127. Springer, Berlin (2005)","DOI":"10.1007\/11426639_7"},{"key":"152_CR33","unstructured":"Zhang, Z., Zhou, Y., Feng, D.: Efficient and optimistic fair exchanges based on standard RSA with provable security. Cryptology ePrint Archive, Report 2003\/178 (2004)"},{"key":"152_CR34","unstructured":"Zhu, H.: Constructing optimistic fair exchange protocols from committed signatures. Cryptology ePrint Archive, Report 2005\/012 (2003)"},{"key":"152_CR35","doi-asserted-by":"crossref","unstructured":"Zhu, H., Bao, F.: Stand-alone and setup-free verifiably committed signatures. In: Proceedings of Topics in Cryptology\u2014CT-RSA 2006, Lecture Notes in Computer Science, vol. 3860, pp. 159\u2013173. Springer, Berlin (2006)","DOI":"10.1007\/11605805_11"},{"key":"152_CR36","doi-asserted-by":"crossref","unstructured":"Zhu, H., Susilo, W., Mu, Y.: Multi-party stand-alone and setup-free verifiably committed signatures. In: Proceedings of Public Key Cryptography 2007, Lecture Notes in Computer Science, vol. 4450, pp. 134\u2013149. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-71677-8_10"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-011-0152-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-011-0152-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-011-0152-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T00:53:42Z","timestamp":1560992022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-011-0152-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,1]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["152"],"URL":"https:\/\/doi.org\/10.1007\/s10207-011-0152-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,12,1]]}}}