{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:40:30Z","timestamp":1759092030489},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2012,7,17]],"date-time":"2012-07-17T00:00:00Z","timestamp":1342483200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s10207-012-0169-2","type":"journal-article","created":{"date-parts":[[2012,7,16]],"date-time":"2012-07-16T06:35:14Z","timestamp":1342420514000},"page":"349-363","source":"Crossref","is-referenced-by-count":11,"title":["Strong accumulators from collision-resistant hashing"],"prefix":"10.1007","volume":"11","author":[{"given":"Philippe","family":"Camacho","sequence":"first","affiliation":[]},{"given":"Alejandro","family":"Hevia","sequence":"additional","affiliation":[]},{"given":"Marcos","family":"Kiwi","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Opazo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,7,17]]},"reference":[{"key":"169_CR1","unstructured":"Asociaci\u00f3n Chilena de Factoring (ACHEF). Estad\u00edsticas. http:\/\/www.achef.cl\/ [June 28, 2011])"},{"key":"169_CR2","doi-asserted-by":"crossref","unstructured":"Bari\u0107, N., Pfitzmann, B.: Collision-free accumulators and fail-stop signed scheme without trees. In: Advances in Cryptology\u2014Proceedings of Eurocrypt \u201997, vol. 1233 of LNCS, pp. 480\u2013494, Springer (1997)","DOI":"10.1007\/3-540-69053-0_33"},{"key":"169_CR3","doi-asserted-by":"crossref","unstructured":"Bayer, D., Haber, S., Stornetta W.S.: Improving the efficiency and reliability of digital time-stamping. In: Sequences II: Methods in Communication, Security, and Computer Science, pp. 329\u2013334. Springer (1993)","DOI":"10.1007\/978-1-4613-9323-8_24"},{"key":"169_CR4","doi-asserted-by":"crossref","unstructured":"Benaloh, J., De Mare M.: One-way accumulators: a decentralized alternative to digital signatures. In: Advances in Cryptology\u2014Proceedings of Eurocrypt \u201993, vol. 765 of LNCS, pp. 274\u2013285. Springer (1993)","DOI":"10.1007\/3-540-48285-7_24"},{"key":"169_CR5","doi-asserted-by":"crossref","unstructured":"Boneh, D., Venkatesan R.: Breaking RSA may not be equivalent to factoring. In: Advances in Cryptology\u2014Proceedings of Eurocrypt \u201998, vol. 1233 of LNCS, pp. 59\u201371. Springer (1998)","DOI":"10.1007\/BFb0054117"},{"key":"169_CR6","doi-asserted-by":"crossref","unstructured":"Canetti, R., Micciancio, D., Reingold O.: Perfectly one-way probabilistic hash functions. In: 30th Annual Symposium on the Theory of Computing, pp. 131\u2013140, ACM Press (1998)","DOI":"10.1145\/276698.276721"},{"key":"169_CR7","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Advances in Cryptology\u2014Proceedings of Crypto \u201902, volume 2442 of LNCS, pp. 61\u201376, Springer (2002)","DOI":"10.1007\/3-540-45708-9_5"},{"key":"169_CR8","doi-asserted-by":"crossref","unstructured":"Cramer R., Gennaro R., Schoenmakers B.: A secure and optimally efficient multi-authority election scheme. In: Advances in Cryptology\u2014Proceedings of Eurocrypt \u201997, vol. 1233 of LNCS, pp. 103\u2013118. Springer (1997)","DOI":"10.1007\/3-540-69053-0_9"},{"key":"169_CR9","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I.: Collision free hash functions and public key signature schemes. In: Advances in Cryptology, Proceedings of Eurocrypt \u201987, vol. 308 of LNCS, pp. 203\u2013216. Springer (1988)","DOI":"10.1007\/3-540-39118-5_19"},{"key":"169_CR10","unstructured":"Fazio, N., Nicolisi, A.: Cryptographic accumulators: Definitions, constructions and applications, 2003. http:\/\/www.cs.nyu.edu\/~nicolosi\/papers\/accumulators.ps [June 19, 2008])"},{"issue":"2","key":"169_CR11","doi-asserted-by":"crossref","first-page":"305","DOI":"10.2307\/1882892","volume":"53","author":"W.H. Hurd","year":"1939","unstructured":"Hurd W.H.: Four centuries of factoring. Q. J. Econ. 53(2), 305\u2013311 (1939)","journal-title":"Q. J. Econ."},{"key":"169_CR12","unstructured":"International Factors Group (IFG). http:\/\/www.ifgroup.com\/ [June 28, 2011])"},{"key":"169_CR13","doi-asserted-by":"crossref","unstructured":"Kate, A., Goldberg I.: Distributed key generation for the internet. In: 29th IEEE International Conference on Distributed Computing Systems, June, pp. 119\u2013128, IEEE Press (2009)","DOI":"10.1109\/ICDCS.2009.21"},{"key":"169_CR14","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: On certificate revocation and validation. In: Financial Cryptography, vol. 1465 of LNCS, pp. 172\u2013177. Springer (1998)","DOI":"10.1007\/BFb0055481"},{"key":"169_CR15","doi-asserted-by":"crossref","unstructured":"Li, J., Li, N., Xue R.: Universal accumulators with efficient nonmembership proofs. In: Proceedings of Applied Cryptography and Network Security\u2014ACNS \u201907, vol. 4521 of LNCS (2007)","DOI":"10.1007\/978-3-540-72738-5_17"},{"key":"169_CR16","unstructured":"National Institute of Standards and Technology (NIST). FIPS Publication 180: Secure Hash Standard (SHS), (May 1993)"},{"key":"169_CR17","unstructured":"OpenSSL Project. OpenSSL Package, June 2008. http:\/\/www.openssl.org [June 19, 2008])"},{"key":"169_CR18","doi-asserted-by":"crossref","unstructured":"Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: 21st Annual Symposium on the Theory of Computing, pp. 73\u201385, ACM Press (1989)","DOI":"10.1145\/73007.73014"},{"key":"169_CR19","doi-asserted-by":"crossref","unstructured":"Rogaway, P.: Formalizing Human Ignorance. In: Progress in Cryptology\u2014Proceedings of Vietcrypt \u201906, vol. 4341 of LNCS, pp. 211\u2013228. Springer (2006)","DOI":"10.1007\/11958239_14"},{"key":"169_CR20","unstructured":"Servicio de Impuestos Internos. Informaci\u00f3n sobre factura electr\u00f3nica. (https:\/\/palena.sii.cl\/dte\/menu.html [June 24, 2011])"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-012-0169-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-012-0169-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-012-0169-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,30]],"date-time":"2019-06-30T20:24:47Z","timestamp":1561926287000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-012-0169-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7,17]]},"references-count":20,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["169"],"URL":"https:\/\/doi.org\/10.1007\/s10207-012-0169-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,17]]}}}