{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:29Z","timestamp":1750221269375,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS0521"],"award-info":[{"award-number":["16KIS0521"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["RU 1664\/3-1, PA 587\/10-1"],"award-info":[{"award-number":["RU 1664\/3-1, PA 587\/10-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134071","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1925-1942","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["BBA+"],"prefix":"10.1145","author":[{"given":"Gunnar","family":"Hartung","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"given":"Max","family":"Hoffmann","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Bochum, Germany"}]},{"given":"Matthias","family":"Nagel","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"given":"Andy","family":"Rupp","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_2_1_1","DOI":"10.1007\/978-3-642-22792-9_37"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1007\/978-3-662-46803-6_2"},{"volume-title":"Advances in Cryptology -- EUROCRYPT 2001 (Lecture Notes in Computer Science)","author":"Aiello William","unstructured":"William Aiello, Yuval Ishai, and Omer Reingold. 2001. Priced Oblivious Transfer: How to Sell Digital Goods. In Advances in Cryptology -- EUROCRYPT 2001 (Lecture Notes in Computer Science), Birgit Pfitzmann (Ed.), Vol. 2045. Springer, Heidelberg, Germany, Innsbruck, Austria, 119--135.","key":"e_1_3_2_2_3_1"},{"unstructured":"Aimia Coalition Loyalty UK Ltd. 2016. The Nectar loyalty program. Online Resource. (2016). https:\/\/www.nectar.com\/.","key":"e_1_3_2_2_4_1"},{"unstructured":"D. F. Aranha and C. P. L. Gouv\u00eaa. 2016. RELIC is an Efficient Library for Cryptography. Online Resource. (2016). https:\/\/github.com\/relic-toolkit\/relic.","key":"e_1_3_2_2_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_6_1","DOI":"10.1007\/978--3--662--46447--2_5"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_7_1","DOI":"10.1007\/11693383_22"},{"key":"e_1_3_2_2_8_1","volume-title":"P-signatures and Noninteractive Anonymous Credentials. In TCC 2008: 5th Theory of Cryptography Conference (Lecture Notes in Computer Science), Ran Canetti (Ed.)","volume":"4948","author":"Belenkiy Mira","year":"2008","unstructured":"Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, and Anna Lysyanskaya. 2008. P-signatures and Noninteractive Anonymous Credentials. In TCC 2008: 5th Theory of Cryptography Conference (Lecture Notes in Computer Science), Ran Canetti (Ed.), Vol. 4948. Springer, Heidelberg, Germany, San Francisco, CA, USA, 356--374."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_9_1","DOI":"10.1007\/978-3-540-24676-3_4"},{"volume-title":"Advances in Cryptology -- ASIACRYPT 2008 (Lecture Notes in Computer Science)","author":"Camenisch Jan","unstructured":"Jan Camenisch, Rafik Chaabouni, and abhi shelat. 2008. Efficient Protocols for Set Membership and Range Proofs. In Advances in Cryptology -- ASIACRYPT 2008 (Lecture Notes in Computer Science), Josef Pieprzyk (Ed.), Vol. 5350. Springer, Heidelberg, Germany, Melbourne, Australia, 234--252.","key":"e_1_3_2_2_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1007\/978-3-642-14577-3_8"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_12_1","DOI":"10.1007\/11426639_18"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.1007\/978--3--540--68914-0_13"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_14_1","DOI":"10.1007\/978-3-642-32946-3_14"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_15_1","DOI":"10.1016\/j.jss.2011.06.073"},{"key":"e_1_3_2_2_16_1","volume-title":"Garcia","author":"de Koning Gans Gerhard","year":"2008","unstructured":"Gerhard de Koning Gans, Jaap-Henk Hoepman, and Flavio D. Garcia. 2008. A Practical Attack on the MIFARE Classic. In Smart Card Research and Advanced Applications: 8th IFIP WG 8.8\/11.2 International Conference, Proceedings, Gilles Grimaud and Fran\u00e7ois-Xavier Standaert (Eds.). Springer, Heidelberg, Germany, London, UK, 267--282."},{"volume-title":"Advances in Cryptology -- CRYPTO'84 (Lecture Notes in Computer Science)","author":"ElGamal Taher","unstructured":"Taher ElGamal. 1984. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In Advances in Cryptology -- CRYPTO'84 (Lecture Notes in Computer Science), G. R. Blakley and David Chaum (Eds.), Vol. 196. Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 10--18.","key":"e_1_3_2_2_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1007\/978-3-642-54631-0_36"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.1007\/978-3-540-88313-5_7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_20_1","DOI":"10.1109\/SP.2009.6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.1007\/978-3-540-78967-3_24"},{"doi-asserted-by":"crossref","unstructured":"Gunnar Hartung Max Hoffmann Matthias Nagel and Andy Rupp. 2017. BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection (full paper). (2017). http:\/\/homepage.rub.de\/andy.rupp\/papers\/bbap_full_paper. pdf.","key":"e_1_3_2_2_22_1","DOI":"10.1145\/3133956.3134071"},{"volume-title":"13th IMA International Conference on Cryptography and Coding (Lecture Notes in Computer Science)","author":"Izabach\u00e8ne Malika","unstructured":"Malika Izabach\u00e8ne, Beno\u00eet Libert, and Damien Vergnaud. 2011. Block-Wise PSignatures and Non-interactive Anonymous Credentials with Efficient Attributes. In 13th IMA International Conference on Cryptography and Coding (Lecture Notes in Computer Science), Liqun Chen (Ed.), Vol. 7089. Springer, Heidelberg, Germany, Oxford, UK, 431--450.","key":"e_1_3_2_2_24_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_25_1","DOI":"10.1515\/popets-2016-0016"},{"unstructured":"Yuto Kawahara Tetsutaro Kobayashi Michael Scott and Akihiro Kato. 2016. Barreto-Naehrig Curves. Internet Draft. Internet Engineering Task Force. Work in Progress.","key":"e_1_3_2_2_26_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_27_1","DOI":"10.1016\/j.jpowsour.2004.12.025"},{"volume-title":"uCentive: An efficient, anonymous and unlinkable incentives scheme. In 2015 IEEE Trustcom\/BigDataSE\/ISPA","author":"Milutinovic Milica","unstructured":"Milica Milutinovic, Italo Dacosta, Andreas Put, and Bart De Decker. 2015. uCentive: An efficient, anonymous and unlinkable incentives scheme. In 2015 IEEE Trustcom\/BigDataSE\/ISPA, Vol. 1. IEEE Computer Society Press, Helsinki, Finland, 588--595.","key":"e_1_3_2_2_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_29_1","DOI":"10.6028\/jres.120.002"},{"unstructured":"NXP Semiconductors Netherlands B.V. 2014. MIFARE Classic EV1 4K Product Data Sheet Revision 3.1. NXP Semiconductors Netherlands B.V.","key":"e_1_3_2_2_30_1"},{"unstructured":"NXP Semiconductors Netherlands B.V. 2016. MIFARE DESFire EV2 contactless multi-application IC Data Sheet Rev. 2.0. NXP Semiconductors Netherlands B.V.","key":"e_1_3_2_2_31_1"},{"volume-title":"Cryptographic Hardware and Embedded Systems -- CHES 2011 (Lecture Notes in Computer Science)","author":"Oswald David","unstructured":"David Oswald and Christof Paar. 2011. Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World. In Cryptographic Hardware and Embedded Systems -- CHES 2011 (Lecture Notes in Computer Science), Bart Preneel and Tsuyoshi Takagi (Eds.), Vol. 6917. Springer, Heidelberg, Germany, Nara, Japan, 207--222.","key":"e_1_3_2_2_32_1"},{"unstructured":"PAYBACK GmbH. 2016. The Payback loyalty program. Online Resource. (2016). https:\/\/www.payback.net\/.","key":"e_1_3_2_2_33_1"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '17","name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134071","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134071"}},"subtitle":["Improving the Security and Applicability of Privacy-Preserving Point Collection"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":32,"alternative-id":["10.1145\/3133956.3134071","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134071","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}