{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:44:24Z","timestamp":1750308264510,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,11,14]],"date-time":"2004-11-14T00:00:00Z","timestamp":1100390400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,11,14]]},"DOI":"10.1145\/1046290.1046317","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"136-142","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A public auction scheme based on group signature"],"prefix":"10.1145","author":[{"given":"Xin","family":"Liu","sequence":"first","affiliation":[{"name":"Shandong University, Jinan, Shandong, PR China"}]},{"given":"Qiu-Liang","family":"Xu","sequence":"additional","affiliation":[{"name":"Shandong University, Jinan, Shandong, PR China"}]},{"given":"Jiu-Qing","family":"Shang","sequence":"additional","affiliation":[{"name":"Shandong University, Jinan, Shandong, PR China"}]}],"member":"320","published-online":{"date-parts":[[2004,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Computer Science 1880","volume-title":"Advances in Cryptology - CRYPTO","author":"Ateniese G.","year":"2000","unstructured":"G. Ateniese , J. Camenish , M. Joye and G. Tsudik . A practical and provably secure coalition-resistent group signature scheme . In: Advances in Cryptology - CRYPTO 2000 , Lecture Notes in Computer Science 1880 , Berlin : Springer-Verlag , 2000: 255--270.]] G. Ateniese, J. Camenish, M. Joye and G. Tsudik. A practical and provably secure coalition-resistent group signature scheme. In: Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science 1880, Berlin: Springer-Verlag, 2000:255--270.]]"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","volume-title":"PKC '2001","author":"Bresson E.","year":"1992","unstructured":"E. Bresson and J. Stern . Efficient revocation in group signatures . In PKC '2001 , Lecture Notes in Computer Science 1992 , Berlin : Springer-Verlag , 2001: 190--206.]] E. Bresson and J. Stern. Efficient revocation in group signatures. In PKC '2001, Lecture Notes in Computer Science 1992, Berlin: Springer-Verlag, 2001:190--206.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704437"},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science 1294","volume-title":"Advances in Cryptology - CRYPO' '1997","author":"Camenish J.","year":"1997","unstructured":"J. Camenish and M. Stadler . Efficient group signature schemes for large groups . In: Advances in Cryptology - CRYPO' '1997 , Lecture Notes in Computer Science 1294 , Berlin : Springer-Verlag , 1997 : 410--424.]] J. Camenish and M. Stadler. Efficient group signature schemes for large groups. In: Advances in Cryptology - CRYPO' '1997, Lecture Notes in Computer Science 1294, Berlin: Springer-Verlag, 1997: 410--424.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_22"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646762.706160"},{"key":"e_1_3_2_1_9_1","series-title":"Lecture Notes in Computer Science 1841","volume-title":"Proceedings of the 5th Australasian Conference on Information and Privacy (ACISP","author":"Nguyen K.","year":"2000","unstructured":"K. Nguyen and J. Traor\u00e9 . An Online Public Auction Protocol Protecting Bidder Privacy . In Proceedings of the 5th Australasian Conference on Information and Privacy (ACISP 2000 ), Lecture Notes in Computer Science 1841 , Berlin : Springer-Verlag , 2000: 427--442.]] K. Nguyen and J. Traor\u00e9. An Online Public Auction Protocol Protecting Bidder Privacy. In Proceedings of the 5th Australasian Conference on Information and Privacy (ACISP 2000), Lecture Notes in Computer Science 1841, Berlin: Springer-Verlag, 2000: 427--442.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646038.678158"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"e_1_3_2_1_12_1","series-title":"Lecture Notes in Computer Science 1841","volume-title":"Proceedings of the 5th Australasian Conference on Information and Privacy (ACISP","author":"Sakurai K.","year":"2000","unstructured":"K. Sakurai and S. Miyazaki . An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme . In: Proceedings of the 5th Australasian Conference on Information and Privacy (ACISP 2000 ), Lecture Notes in Computer Science 1841 , Berlin : Springer-Verlag , 2000: 385--399.]] K. Sakurai and S. Miyazaki. An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme. In: Proceedings of the 5th Australasian Conference on Information and Privacy (ACISP 2000), Lecture Notes in Computer Science 1841, Berlin: Springer-Verlag, 2000: 385--399.]]"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502015"},{"key":"e_1_3_2_1_14_1","volume-title":"A survey of the studies on secure electronic auction","author":"Wang J. L.","year":"2003","unstructured":"J. L. Wang , X. F. Chen , Y. M. Wang . A survey of the studies on secure electronic auction . Journal of XiDian University . Feb. 2003 , Vol. 30 No. 1]] J. L. Wang, X. F. Chen, Y. M. Wang. A survey of the studies on secure electronic auction. Journal of XiDian University. Feb. 2003, Vol. 30 No. 1]]"}],"event":{"name":"INFOSECU04: International Conference on Information Security","sponsor":["ACM Association for Computing Machinery","SCS Shanghai Computer Society","CCF China Computer Federation"],"location":"Shanghai China","acronym":"INFOSECU04"},"container-title":["Proceedings of the 3rd international conference on Information security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1046290.1046317","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1046290.1046317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:23:54Z","timestamp":1750267434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1046290.1046317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,11,14]]},"references-count":12,"alternative-id":["10.1145\/1046290.1046317","10.1145\/1046290"],"URL":"https:\/\/doi.org\/10.1145\/1046290.1046317","relation":{},"subject":[],"published":{"date-parts":[[2004,11,14]]},"assertion":[{"value":"2004-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}