{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:06:06Z","timestamp":1761620766027},"reference-count":19,"publisher":"Elsevier BV","issue":"17","license":[{"start":{"date-parts":[[2000,11,1]],"date-time":"2000-11-01T00:00:00Z","timestamp":973036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2000,11]]},"DOI":"10.1016\/s0140-3664(00)00254-1","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T16:56:47Z","timestamp":1027616207000},"page":"1677-1680","source":"Crossref","is-referenced-by-count":26,"title":["Randomization enhanced Chaum's blind signature scheme"],"prefix":"10.1016","volume":"23","author":[{"given":"Chun-I","family":"Fan","sequence":"first","affiliation":[]},{"given":"Wei-Kuei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yi-Shung","family":"Yeh","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(00)00254-1_BIB1","doi-asserted-by":"crossref","unstructured":"C.A. Boyd, A new multiple key cipher and an improved voting scheme. Advances in Cryptology \u2014 EUROCRYPT\u201994, LNCS 434, Springer, 1990, pp. 617\u2013625.","DOI":"10.1007\/3-540-46885-4_58"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB2","doi-asserted-by":"crossref","unstructured":"S. Brands, Untraceable off-line cash in wallets with observers. Advances in Cryptology \u2014 CRYPTO\u201993, LNCS 773, Springer, 1993, pp. 302\u2013318.","DOI":"10.1007\/3-540-48329-2_26"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB3","doi-asserted-by":"crossref","unstructured":"J. Camenisch, J.M. Piveteau, M. Stadler, An efficient fair payment system protecting privacy. Proceedings of ESORICS\u201994, LNCS 875, Springer, 1994, pp. 207\u2013215.","DOI":"10.1007\/3-540-58618-0_65"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB4","doi-asserted-by":"crossref","unstructured":"D. Chaum, Blind signatures for untraceable payments. Advances in Cryptology \u2014 CRYPTO\u201982, Plenum, 1983.","DOI":"10.1007\/978-1-4757-0602-4"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB5","doi-asserted-by":"crossref","unstructured":"D. Chaum, A. Fiat, M. Naor, Untraceable electronic cash. Advances in Cryptology \u2014 CRYPTO\u201988, LNCS 403, Springer, 1990, pp. 319\u2013327.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB6","doi-asserted-by":"crossref","unstructured":"J.D. Cohen, M.J. Fisher, A robust and verifiable cryptographically secure election scheme. Proceedings of the 26th IEEE Symposium on Foundations of Computer Science, IEEE, 1985, pp. 372\u2013382.","DOI":"10.1109\/SFCS.1985.2"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB7","doi-asserted-by":"crossref","unstructured":"J.S. Coron, D. Naccache, J.P. Stern, On the security of RSA padding. Advances in Cryptology \u2014 CRYPTO\u201999, LNCS 1666, Springer, 1999, pp. 1\u201318.","DOI":"10.1007\/3-540-48405-1_1"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB8","unstructured":"Y. Desmedt, A. Odlyzko, A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes. Advances in Cryptology \u2014 CRYPTO\u201985, LNCS 218, Springer, 1994, pp. 318\u2013328."},{"key":"10.1016\/S0140-3664(00)00254-1_BIB9","doi-asserted-by":"crossref","unstructured":"N. Ferguson, Single term off-line coins. Advances in Cryptology \u2014 EUROCRYPT\u201993, LNCS 765, Springer, 1994, pp. 318\u2013328.","DOI":"10.1007\/3-540-48285-7_28"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB10","doi-asserted-by":"crossref","unstructured":"A. Fujioka, T. Okamoto, K. Ohta, A practical secret voting scheme for large scale elections. Advances in Cryptology \u2014 AUSCRYPT\u201992, LNCS 718, Springer, 1992, pp. 244\u2013251.","DOI":"10.1007\/3-540-57220-1_66"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB11","unstructured":"S. Goldwasser, S. Micali, R.L. Rivest, A digital signature scheme secure against adaptive chosen-message attacks, Technical Report, MIT Lab., Computer Science, Cambridge, Mass., March, 1995."},{"key":"10.1016\/S0140-3664(00)00254-1_BIB12","series-title":"Handbook of Applied Cryptography","author":"Menezes","year":"1997"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB13","doi-asserted-by":"crossref","unstructured":"T. Okamoto, K. Ohta, Universal electronic cash. Advances in Cryptology \u2014 CRYPTO\u201991, LNCS 576, Springer, 1992, pp. 324\u2013337.","DOI":"10.1007\/3-540-46766-1_27"},{"issue":"2","key":"10.1016\/S0140-3664(00)00254-1_BIB14","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1145\/253145.253282","article-title":"Strong loss tolerance of electronic coin systems","volume":"15","author":"Pfitzmann","year":"1999","journal-title":"ACM Transactions on Computer Systems"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB15","doi-asserted-by":"crossref","unstructured":"D. Pointcheval, J. Stern, Provably secure blind signature schemes. Advances in Cryptology \u2014 ASIACRYPT\u201996, LNCS 1163, Springer, 1996, pp. 252\u2013265.","DOI":"10.1007\/BFb0034852"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB16","doi-asserted-by":"crossref","unstructured":"D. Pointcheval, J. Stern, New blind signatures equivalent to factorization. Proceedings of the 4th ACM Conference on Computer and Communication Safety, 1997, pp. 92\u201399.","DOI":"10.1145\/266420.266440"},{"key":"10.1016\/S0140-3664(00)00254-1_BIB17","unstructured":"M.O. Rabin, Digitalized signatures and public-key functions as intractable as factorization, Technical Report, MIT\/LCS\/TR212, MIT Lab., Computer Science, Cambridge, Mass., Jan. 1979."},{"issue":"2","key":"10.1016\/S0140-3664(00)00254-1_BIB18","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of the ACM"},{"issue":"1","key":"10.1016\/S0140-3664(00)00254-1_BIB19","first-page":"24","article-title":"Electronic voting schemes allowing open objection to the tally","volume":"E77-A","author":"Sako","year":"1994","journal-title":"IEICE Transactions onFundamentals"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400002541?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400002541?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T01:25:15Z","timestamp":1579224315000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366400002541"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,11]]},"references-count":19,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2000,11]]}},"alternative-id":["S0140366400002541"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(00)00254-1","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2000,11]]}}}