{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T18:12:13Z","timestamp":1772129533320,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,7,19]],"date-time":"2016-07-19T00:00:00Z","timestamp":1468886400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s11235-016-0201-3","type":"journal-article","created":{"date-parts":[[2016,7,19]],"date-time":"2016-07-19T18:39:10Z","timestamp":1468953550000},"page":"695-708","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Efficient E-coupon systems with strong user privacy"],"prefix":"10.1007","volume":"64","author":[{"given":"Weiwei","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,19]]},"reference":[{"key":"201_CR1","doi-asserted-by":"crossref","unstructured":"Aiello, W., Ishai, Y., & Reingold, O. (2001). Priced oblivious transfer: How to sell digital goods. In Advances in cryptology\u2014EUROCRYPT 2001, international conference on the theory and application of cryptographic techniques (pp. 119\u2013135), Innsbruck.","DOI":"10.1007\/3-540-44987-6_8"},{"key":"201_CR2","unstructured":"Bellare,\u00a0M., & Goldreich,\u00a0O. (1992). On defining proofs of knowledge. In Advances in Cryptology\u2014CRYPTO \u201992, 12th Annual international cryptology conference (pp. 390\u2013420), Santa Barbara, CA."},{"key":"201_CR3","doi-asserted-by":"crossref","unstructured":"Bellare,\u00a0M., & Rogaway,\u00a0P. (1993). Random oracles are practical: A paradigm for designing efficient protocols. In CCS\u201993, proceedings of the 2009 ACM conference on computer and communications security (pp. 62\u201373), Fairfax, VA.","DOI":"10.1145\/168588.168596"},{"issue":"3","key":"201_CR4","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/s00145-002-0120-1","volume":"16","author":"M Bellare","year":"2003","unstructured":"Bellare, M., Namprempre, C., Pointcheval, D., et al. (2003). The one-more-rsa-inversion problems and the security of chaum\u2019s blind signature scheme. Journal of Cryptology, 16(3), 185\u2013215.","journal-title":"Journal of Cryptology"},{"key":"201_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., & Palacio A. (2004). The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols. In Advances in cryptology\u2014CRYPTO, 24th annual international cryptology conference (pp. 273\u2013289), Santa Barbara, CA.","DOI":"10.1007\/978-3-540-28628-8_17"},{"key":"201_CR6","unstructured":"Brands,\u00a0S. (1993). Untraceable off-line cash in wallets with observers (extended abstract). In Advances in cryptology\u2014CRYPTO \u201993, 13th annual international cryptology conference (pp. 302\u2013318), Santa Barbara, CA."},{"key":"201_CR7","unstructured":"Brassard,\u00a0G., Cr\u00e9peau,\u00a0C., & Robert,\u00a0JM. (1986). All-or-nothing disclosure of secrets. In Advances in cryptology\u2014CRYPTO \u201986 (pp. 234\u2013238), Santa Barbara, CA."},{"key":"201_CR8","doi-asserted-by":"crossref","unstructured":"Camenisch,\u00a0J., Dubovitskaya,\u00a0M., & Neven\u00a0G. (2009). Oblivious transfer with access control. In Proceedings of the 2009 ACM conference on computer and communications security (pp. 131\u2013140), Chicago, IL.","DOI":"10.1145\/1653662.1653679"},{"key":"201_CR9","doi-asserted-by":"crossref","unstructured":"Camenisch,\u00a0J., Dubovitskaya,\u00a0M., & Neven,\u00a0G. (2010). Unlinkable priced oblivious transfer with rechargeable wallets. In 14th International conference on financial cryptography and data security, FC 2010 (pp. 66\u201381), Tenerife.","DOI":"10.1007\/978-3-642-14577-3_8"},{"key":"201_CR10","doi-asserted-by":"crossref","unstructured":"Camenisch,\u00a0J., Neven,\u00a0G., & Shelat,\u00a0A. (2007). Simulatable adaptive oblivious transfer. In Advances in cryptology\u2014EUROCRYPT 2007, 26th annual international conference on the theory and applications of cryptographic techniques (pp. 573\u2013590), Barcelona.","DOI":"10.1007\/978-3-540-72540-4_33"},{"key":"201_CR11","doi-asserted-by":"crossref","unstructured":"Canard,\u00a0S., Gouget,\u00a0A., & Hufschmitt,\u00a0E. (2006). A handy multi-coupon system. In ACNS (pp. 66\u201381).","DOI":"10.1007\/11767480_5"},{"key":"201_CR12","unstructured":"Chaum,\u00a0D. (1982). Blind signatures for untraceable payments. CRYPTO (pp. 199\u2013203)."},{"key":"201_CR13","unstructured":"Chaum,\u00a0D., Fiat,\u00a0A., & Naor,\u00a0M. (1988). Untraceable electronic cash. In Advances in cryptology\u2014CRYPTO \u201988, 8th annual international cryptology conference (pp. 319\u2013327), Santa Barbara, CA."},{"key":"201_CR14","doi-asserted-by":"crossref","unstructured":"Chen,\u00a0L., Enzmann,\u00a0M., Sadeghi,\u00a0AR., et al. (2005). A privacy-protecting coupon system. In Financial cryptography (pp. 93\u2013108).","DOI":"10.1007\/11507840_12"},{"key":"201_CR15","doi-asserted-by":"crossref","unstructured":"Chu,\u00a0C. K., & Tzeng,\u00a0W. G. (2005). Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. In Public key cryptography (pp. 172\u2013183).","DOI":"10.1007\/978-3-540-30580-4_12"},{"key":"201_CR16","doi-asserted-by":"crossref","unstructured":"Coull,\u00a0SE., Green,\u00a0M., & Hohenberger\u00a0S. (2009). Controlling access to an oblivious database using stateful anonymous credentials. In Public key cryptography\u2014PKC 2009, 12th international conference on practice and theory in public key cryptography (pp. 501\u2013520), Irvine, CA.","DOI":"10.1007\/978-3-642-00468-1_28"},{"key":"201_CR17","doi-asserted-by":"crossref","unstructured":"Even, S., Goldreich, O., & Lempel, A. (1985). A randomized protocol for signing contracts. Communications of the ACM, 28(6), 637\u2013647.","DOI":"10.1145\/3812.3818"},{"issue":"6","key":"201_CR18","first-page":"929","volume":"15","author":"P Guo","year":"2014","unstructured":"Guo, P., Wang, J., Li, B., & Lee, S. (2014). A variable threshold-value authentication architecture for wireless mesh networks. Journal of Internet Technology, 15(6), 929\u2013936.","journal-title":"Journal of Internet Technology"},{"key":"201_CR19","doi-asserted-by":"crossref","unstructured":"Han, J. G., Susilo, W., Mu, Y., et al. (2012). Efficient oblivious transfers with access control. Computers & Mathematics with Applications, 63(4), 827\u2013837.","DOI":"10.1016\/j.camwa.2011.11.048"},{"key":"201_CR20","unstructured":"Juels,\u00a0A., Luby,\u00a0M., & Ostrovsky,\u00a0R. (1997). Security of blind digital signatures (extended abstract). In CRYPTO (pp. 150\u2013164)."},{"key":"201_CR21","unstructured":"Kilian, \u00a0J. (1988). Founding cryptography on oblivious transfer. In Proceedings of the 20th annual ACM symposium on theory of computing (pp. 20\u201331)."},{"issue":"4","key":"201_CR22","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","volume":"28","author":"L Liao","year":"2015","unstructured":"Liao, L., & Shu, C. (2015). Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. Journal of Visual Communication and Image Representation, 28(4), 21\u201327.","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"201_CR23","unstructured":"Liu,\u00a0W., Mu,\u00a0Y., & Yang,\u00a0G. M. (2014). An efficient privacy-preserving e-coupon system. In Information security and cryptology\u201410th international conference (pp. 1\u201313), Beijing."},{"issue":"3","key":"201_CR24","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1016\/j.jss.2010.11.886","volume":"84","author":"X Ma","year":"2011","unstructured":"Ma, X., Xu, L., & Zhang, F. G. (2011). Oblivious transfer with timed-release receiver\u2019s privacy. Journal of Systems and Software, 84(3), 460\u2013464.","journal-title":"Journal of Systems and Software"},{"key":"201_CR25","doi-asserted-by":"crossref","unstructured":"Mu,\u00a0Y., Nguyen,\u00a0K. Q., & Varadharajan,\u00a0V. (2001). A fair electronic cash scheme. In ISEC 2001, topics in electronic commerce, second international symposium (pp. 20\u201332), Hong Kong.","DOI":"10.1007\/3-540-45415-2_2"},{"key":"201_CR26","doi-asserted-by":"crossref","unstructured":"Mu,\u00a0Y., Zhang,\u00a0J. Q., & Varadharajan,\u00a0V. (2002). m out of n oblivious transfer. In ACISP 2002, 7th Australian conference on information security and privacy (pp. 395\u2013405), Melbourne.","DOI":"10.1007\/3-540-45450-0_30"},{"issue":"1","key":"201_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00145-004-0102-6","volume":"18","author":"M Naor","year":"2005","unstructured":"Naor, M., & Pinkas, B. (2005). Computationally secure oblivious transfer. Journal of Cryptology, 18(1), 1\u201335.","journal-title":"Journal of Cryptology"},{"key":"201_CR28","doi-asserted-by":"crossref","unstructured":"Naor,\u00a0M., & Pinkas,\u00a0B. (1999). Oblivious transfer with adaptive queries. In Advances in cryptology\u2014CRYPTO \u201999, 19th annual international cryptology conference (pp. 573\u2013590).","DOI":"10.1007\/3-540-48405-1_36"},{"key":"201_CR29","unstructured":"Nguyen,\u00a0L., & Safavi-Naini,\u00a0R. (2005). k-times anonymous authentication. In Applied cryptography and network security\u2014ACNS 2005, third international conference (pp. 318\u2013333)."},{"key":"201_CR30","doi-asserted-by":"crossref","unstructured":"Nguyen,\u00a0L. (2006). Privacy-protecting coupon system revisited. In Financial cryptography (pp. 266\u2013280).","DOI":"10.1007\/11889663_22"},{"key":"201_CR31","doi-asserted-by":"crossref","unstructured":"Teranishi,\u00a0I., Furukawa,\u00a0J., & Sako,\u00a0K. (2004). k-times anonymous authentication (extended abstract). In Advances in cryptology\u2014ASIACRYPT 2004, 10th international conference on the theory and application of cryptology and information security (pp. 308\u2013322).","DOI":"10.1007\/978-3-540-30539-2_22"},{"key":"201_CR32","doi-asserted-by":"crossref","unstructured":"Pointcheval,\u00a0D., & Stern,\u00a0J. (1996). Security proofs for signature schemes. In Advances in cryptology\u2014EUROCRYPT \u201996, international conference on the theory and application of cryptographic techniques (pp. 387\u2013398), Saragossa.","DOI":"10.1007\/3-540-68339-9_33"},{"key":"201_CR33","unstructured":"Rabin,\u00a0M. O. (1981). How to exchnge secrets by oblivious transfer. Technical Report, TR-81, Computer Science Laboratory, Harvard."},{"key":"201_CR34","unstructured":"Schnorr,\u00a0C. P. (1989). Efficient identification and signatures for smart cards. In Advances in cryptology\u2014CRYPTO \u201989, 9th annual international cryptology conference (pp. 239\u2013252)."},{"key":"201_CR35","doi-asserted-by":"crossref","unstructured":"Stadler,\u00a0M., Piveteau,\u00a0J. M., & Camenisch,\u00a0J. (1995). Fair blind signatures. In EUROCRYPT (pp. 209\u2013219).","DOI":"10.1007\/3-540-49264-X_17"},{"key":"201_CR36","unstructured":"Yao,\u00a0A. C. C. (1986). How to generate and exchange secrets (extended abstract). In 27th annual symposium on foundations of computer science (pp. 162\u2013167), Toronto."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-016-0201-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-016-0201-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-016-0201-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-016-0201-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T18:45:15Z","timestamp":1498329915000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-016-0201-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,19]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["201"],"URL":"https:\/\/doi.org\/10.1007\/s11235-016-0201-3","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,19]]}}}