{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:47:41Z","timestamp":1774716461538,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660328","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"1205-1216","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":75,"title":["Algebraic MACs and Keyed-Verification Anonymous Credentials"],"prefix":"10.1145","author":[{"given":"Melissa","family":"Chase","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Sarah","family":"Meiklejohn","sequence":"additional","affiliation":[{"name":"UCSD, San Diego, CA, USA"}]},{"given":"Greg","family":"Zaverucha","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11832072_8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516687"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646757.759584"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653734"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/648184.749735"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking Public Key Infrastructures and Digital Certificates","author":"Brands S.","year":"2000","unstructured":"S. Brands . Rethinking Public Key Infrastructures and Digital Certificates . The MIT Press , August 2000 . S. Brands. Rethinking Public Key Infrastructures and Digital Certificates. The MIT Press, August 2000."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/647086.715698"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766811.1766838"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"e_1_3_2_1_13_1","first-page":"127","article-title":"The Twin Diffie-Hellman Problem and Applications Proceedings of Eurocrypt 2008","volume":"4965","author":"Cash D.","year":"2008","unstructured":"D. Cash , E. Kiltz , and V. Shoup . The Twin Diffie-Hellman Problem and Applications Proceedings of Eurocrypt 2008 , LNCS 4965 ( 2008 ), 127 -- 145 . D. Cash, E. Kiltz, and V. Shoup. The Twin Diffie-Hellman Problem and Applications Proceedings of Eurocrypt 2008, LNCS 4965 (2008), 127--145.","journal-title":"LNCS"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4373"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36334-4_8"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754542.1754554"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of EUROCRYPT 2000","author":"Damgard I.","year":"1807","unstructured":"I. Damgard . Efficient Concurrent Zero-Knowledge in the Auxiliary String Model . Proceedings of EUROCRYPT 2000 , LNCS 1807 (2000), 418--430. I. Damgard. Efficient Concurrent Zero-Knowledge in the Auxiliary String Model. Proceedings of EUROCRYPT 2000, LNCS 1807 (2000), 418--430."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_22"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of CRYPTO 1986","author":"Fiat A.","year":"1987","unstructured":"A. Fiat and A. Shamir . How to Prove Yourself: Practical Solutions to Identification and Signature Problems . Proceedings of CRYPTO 1986 , LNCS 263 ( 1987 ), 186--194. 1214 A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. Proceedings of CRYPTO 1986, LNCS 263 (1987), 186--194. 1214"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_10"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_4"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"The Foundations of Cryptography -","author":"Goldreich O.","year":"2004","unstructured":"O. Goldreich . The Foundations of Cryptography - Volume 2 Basic Applications. Cambridge University Press , New York, 2004 . O. Goldreich. The Foundations of Cryptography - Volume 2 Basic Applications. Cambridge University Press, New York, 2004."},{"key":"e_1_3_2_1_23_1","volume-title":"IBM Research Report RZ","author":"Identity Mixer Cryptographic IBM.","year":"2010","unstructured":"IBM. Specification of the Identity Mixer Cryptographic Library (Revised version 2.3.0). IBM Research Report RZ 3730, April 2010 . IBM. Specification of the Identity Mixer Cryptographic Library (Revised version 2.3.0). IBM Research Report RZ 3730, April 2010."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754495.1754513"},{"key":"e_1_3_2_1_25_1","volume-title":"Federal Information Processing Standards Publication","author":"NIST.","year":"2009","unstructured":"NIST. FIPS 186--3: Digital Signature Standard (DSS) , Federal Information Processing Standards Publication ( 2009 ). NIST. FIPS 186--3: Digital Signature Standard (DSS), Federal Information Processing Standards Publication (2009)."},{"key":"e_1_3_2_1_26_1","series-title":"Revision 2","volume-title":"U-Prove Cryptographic Specification V1.1","author":"Paquin C.","year":"2013","unstructured":"C. Paquin and G. Zaverucha . U-Prove Cryptographic Specification V1.1 ( Revision 2 ) . April 2013 . Available online: www.microsoft.com\/uprove. C. Paquin and G. Zaverucha. U-Prove Cryptographic Specification V1.1 (Revision 2). April 2013. Available online: www.microsoft.com\/uprove."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"e_1_3_2_1_28_1","volume-title":"Security of Blind Discrete Log Signatures Against Interactive Attacks. ICICS 2001","author":"Schnorr C.","year":"2001","unstructured":"C. Schnorr . Security of Blind Discrete Log Signatures Against Interactive Attacks. ICICS 2001 , LNCS 2229 ( 2001 ), 1--12. C. Schnorr. Security of Blind Discrete Log Signatures Against Interactive Attacks. ICICS 2001, LNCS 2229 (2001), 1--12."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754542.1754568"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of PKC 1998","author":"Tsiounis Y.","year":"1998","unstructured":"Y. Tsiounis and M. Yung On the security of ElGamal based encryption . Proceedings of PKC 1998 , LNCS 1431 ( 1998 ), 117--134. Y. Tsiounis and M. Yung On the security of ElGamal based encryption. Proceedings of PKC 1998, LNCS 1431 (1998), 117--134."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/647995.742445"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_23"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_36"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","location":"Scottsdale Arizona USA","acronym":"CCS'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:10Z","timestamp":1750229770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":31,"alternative-id":["10.1145\/2660267.2660328","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660328","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}