{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:14:13Z","timestamp":1729610053477,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596031","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T11:54:58Z","timestamp":1379591698000},"page":"11-18","source":"Crossref","is-referenced-by-count":0,"title":["Key privacy and anonymous protocols"],"prefix":"10.1109","author":[{"given":"Paolo","family":"D'Arco","sequence":"first","affiliation":[]},{"given":"Alfredo","family":"De Santis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"422","article-title":"An auction protocol which hides bids of losers","volume":"1751","author":"sako","year":"2000","journal-title":"Proc of the Third International Workshop on Theory and Practice of Public-Key Cryptography (PKC 2000) LNCS"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2003.1238183"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(97)80449-8"},{"journal-title":"Introduction to Modern Cryptography","year":"2008","author":"katz","key":"13"},{"key":"14","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/978-3-642-30057-8_13","article-title":"Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model","volume":"7293","author":"libert","year":"2012","journal-title":"Proc of the 15th International Conference on Practice and Theory in Public Key Cryptography (PKC 2012) LNCS 2012"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/972639.972642"},{"key":"3","first-page":"26","article-title":"Relations among notions of security for public-key encryption schemes","volume":"1462","author":"bellare","year":"1998","journal-title":"Proc of Crypto 1998 LNCS"},{"key":"2","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1007\/3-540-45682-1_33","article-title":"Key-privacy in public-key encryption","volume":"2248","author":"bellare","year":"2001","journal-title":"Proc of Asiacrypt 2001 LNCS"},{"key":"1","first-page":"480","article-title":"Robust encryption","volume":"5978","author":"abdalla","year":"2010","journal-title":"Proc of TCC 2010 LNCS"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_40"},{"key":"7","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/11426639_25","article-title":"Mercurial Committments with applications to zero-knowkedge sets","volume":"3494","author":"chase","year":"2005","journal-title":"Proc of Eurocrypt 2005 LNCS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_25"},{"key":"5","first-page":"120","article-title":"Mercurial commitments: Minimal assumptions and efficient constructions","volume":"3876","author":"catalano","year":"2006","journal-title":"Proc of the Third Theory of Cryptography Conference (TCC 06) LNCS"},{"key":"4","first-page":"52","article-title":"Privacy in encrypted content distribution using private broadcast encryption","volume":"4107","author":"barth","year":"2006","journal-title":"Proc of Financial Cryptography (FC 2006) LNCS"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00061-2"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795291562"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596031.pdf?arnumber=6596031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T18:11:26Z","timestamp":1498068686000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596031\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596031","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}