{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:45:09Z","timestamp":1729651509134,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cmpsac.2004.1342867","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T11:28:24Z","timestamp":1099913304000},"page":"384-389","source":"Crossref","is-referenced-by-count":1,"title":["Publicly verifiable auctions with minimal leakage"],"prefix":"10.1109","author":[{"family":"Wu Qianhong","sequence":"first","affiliation":[]},{"family":"Wang Changjie","sequence":"additional","affiliation":[]},{"family":"Chen Xiaofeng","sequence":"additional","affiliation":[]},{"family":"Wang Yumin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(98)00060-8"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1086\/296663"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-46588-1_28"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544770"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36504-4_7"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"key":"13","article-title":"(M+1)st-price auction protocol","author":"kikuchi","year":"2001","journal-title":"Proc Financial Cryptography"},{"key":"14","first-page":"20","article-title":"Secure electronic sealed-bid auction protocol with public key cryptography","volume":"e81 a","author":"kudo","year":"1998","journal-title":"IEICE Trans Fundamentals"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/PADSW.2000.884610"},{"key":"12","first-page":"769","article-title":"Multi-round anonymous auction protocols","volume":"e82 d","author":"kikuchi","year":"1999","journal-title":"IEICE Trans Inf & Syst"},{"key":"21","article-title":"Secure generalized vickrey auction using homomorphic encryption","author":"suzuki","year":"0","journal-title":"Proc FCCM 2003"},{"key":"3","article-title":"Secure and private auctions without auctioneers","volume":"fki 245 2","author":"brandt","year":"2002","journal-title":"Technical Report"},{"journal-title":"Secure Auctions in a Publish\/subscribe System","year":"2000","author":"song","key":"20"},{"key":"2","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/3-540-45664-3_8","article-title":"M+1-st price auction using homomorphic encryption","author":"abe","year":"2002","journal-title":"Proceedings of the 5th International Conference on Public Key Cryptography (PKC-02)"},{"key":"1","first-page":"415","article-title":"1-out-of-n signatures from a variety of keys","author":"abe","year":"2002","journal-title":"Asiacrypt'02"},{"key":"10","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1007\/3-540-68697-5_15","article-title":"Proving without knowing: On oblivious, agnostic and blindfolded provers","volume":"1109","author":"jakobsson","year":"1996","journal-title":"Lecture Notes in Computer Science"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45439-X_28"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48658-5_19"},{"key":"4","article-title":"A fair and efficient solution to the socialist millionaires' problem, discrete applied mathematics","author":"boudot","year":"2000","journal-title":"Special Issue on Coding and Cryptography"},{"key":"9","article-title":"Yet another strong sealed-bid auctions","author":"ham","year":"0","journal-title":"Proc of SCIS 2003"},{"key":"8","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/BFb0052225","article-title":"Statistical zero knowledge protocols to prove modular polynomial relations","volume":"1294","author":"fujisaki","year":"1997","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004.","location":"Hong Kong"},"container-title":["Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9304\/29570\/01342867.pdf?arnumber=1342867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:37:52Z","timestamp":1497598672000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1342867\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.2004.1342867","relation":{},"subject":[]}}