{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T22:06:06Z","timestamp":1648505166771},"reference-count":27,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2004,6,1]],"date-time":"2004-06-01T00:00:00Z","timestamp":1086048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2004,6]]},"DOI":"10.1016\/s0164-1212(03)00017-7","type":"journal-article","created":{"date-parts":[[2003,10,11]],"date-time":"2003-10-11T03:27:44Z","timestamp":1065842864000},"page":"25-31","source":"Crossref","is-referenced-by-count":2,"title":["Fair blind threshold signatures in wallet with observers"],"prefix":"10.1016","volume":"72","author":[{"given":"Wen-Shenq","family":"Juang","sequence":"first","affiliation":[]},{"given":"Horng-Twu","family":"Liaw","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0164-1212(03)00017-7_BIB1","series-title":"Advances in Cryptology: Proceedings of EuroCrypt'94","first-page":"428","article-title":"Untraceable off-line cash in wallet with observers","author":"Brands","year":"1994"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB2","series-title":"Advances in Cryptology: Proceedings of EuroCrypt'94","first-page":"428","article-title":"Blind signatures based on the discrete logarithm problem","author":"Camenisch","year":"1994"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB3","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses, and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB4","series-title":"Advances in Cryptology: Proceedings of Crypt'82","first-page":"199","article-title":"Blind signatures for untraceable payments","author":"Chaum","year":"1982"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB5","series-title":"Advances in Cryptology: Proceedings of Crypt'92","first-page":"89","article-title":"Wallet databases with observers","author":"Chaum","year":"1992"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithm","volume":"IT-31","author":"ElGamal","year":"1985","journal-title":"IEEE Transactions on Information Theory"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB7","series-title":"Advances in Cryptology: Proceedings of EuroCrypt'93","first-page":"318","article-title":"Single term off-line coins","author":"Ferguson","year":"1993"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB8","series-title":"Advances in Cryptology: Proceedings of EuroCrypt '96","first-page":"354","article-title":"Robust threshold DSS signatures","author":"Gennaro","year":"1996"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB9","series-title":"Advances in Cryptology: Proceedings of EuroCrypt'99","first-page":"295","article-title":"Secure distributed key generation for discrete-log based cryptosystems","author":"Gennaro","year":"1999"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB10","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1049\/ip-cdt:19941293","article-title":"Group-oriented (t,n) threshold digital signature scheme and digital multisignature","volume":"141","author":"Harn","year":"1994","journal-title":"IEE Proceedings on Computers and Digital Techniques"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB11","series-title":"Advances in Cryptology: Proceedings of AisaCrypt'94","first-page":"224","article-title":"Meta-message recovery and meta-blind signature schemes based on the discrete logarithm problem and their applications","author":"Horster","year":"1994"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB12","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/S0164-1212(01)00032-2","article-title":"New nonrepudiable threshold proxy signature scheme with known signers","volume":"148","author":"Hsu","year":"2001","journal-title":"The Journal of Systems and Software"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB13","series-title":"Proceedings of Second Asian Computing Science Conference on Programming, Concurrency and Parallelism, Networking and Security","first-page":"172","article-title":"Blind threshold signatures based on discrete logarithm","author":"Juang","year":"1996"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB14","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/S0140-3664(98)00214-X","article-title":"Partially blind threshold signatures based on discrete logarithm","volume":"22","author":"Juang","year":"1999","journal-title":"Computer Communications"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB15","doi-asserted-by":"crossref","first-page":"1502","DOI":"10.1016\/S0140-3664(99)00108-5","article-title":"Anonymous channel and authentication in wireless communications","volume":"22","author":"Juang","year":"1999","journal-title":"Computer Communications"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB16","first-page":"371","article-title":"Fair blind threshold signatures based on discrete logarithm","volume":"16","author":"Juang","year":"2001","journal-title":"International Journal of Computer Systems Sciences & Engineering"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB17","first-page":"23","article-title":"Provably secure blind threshold signatures based on discrete logarithm","volume":"18","author":"Lei","year":"2002","journal-title":"Journal of Information Science and Engineering"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB18","series-title":"Handbook of Applied Cryptography","author":"Menezes","year":"1997"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB19","series-title":"Advances in Cryptology: Proceedings of Crypt'91","first-page":"324","article-title":"Universal electronic cash","author":"Okamoto","year":"1991"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB20","series-title":"Advances in Cryptology: Proceedings of Crypt'91","first-page":"129","article-title":"Non-interactive and information-theoretic secure verifiable secret sharing","author":"Pedersen","year":"1991"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB21","series-title":"Advances in Cryptology: Proceedings of AisaCrypt'96","first-page":"252","article-title":"Provably secure blind signature schemes","author":"Pointcheval","year":"1996"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB22","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public key cryptosystem","volume":"21","author":"Rivest","year":"1978","journal-title":"Communications of ACM"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB23","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Communications of ACM"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB24","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1016\/0167-4048(92)90193-U","article-title":"On blind signatures and perfect crime","volume":"11","author":"Solms","year":"1992","journal-title":"Computers & Security"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB25","series-title":"Advances in Cryptology\u2013\u2013EuroCrypt'95","first-page":"209","article-title":"Fair blind signatures","author":"Stadler","year":"1995"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB26","series-title":"Cryptography and Network Security","author":"Stallings","year":"1999"},{"key":"10.1016\/S0164-1212(03)00017-7_BIB27","doi-asserted-by":"crossref","unstructured":"Wu, T.S., Hsu, C.L., in press. Threshold signature scheme using self-certified public keys. The Journal of Systems and Software","DOI":"10.1016\/S0164-1212(02)00090-0"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121203000177?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121203000177?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,20]],"date-time":"2019-02-20T15:26:12Z","timestamp":1550676372000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121203000177"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,6]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,6]]}},"alternative-id":["S0164121203000177"],"URL":"https:\/\/doi.org\/10.1016\/s0164-1212(03)00017-7","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2004,6]]}}}