{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:27Z","timestamp":1750221387422,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T00:00:00Z","timestamp":1523232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,9]]},"DOI":"10.1145\/3167132.3167303","type":"proceedings-article","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T13:54:10Z","timestamp":1530626050000},"page":"1601-1609","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Bridging the gap in privacy-preserving revocation"],"prefix":"10.1145","author":[{"given":"Michael","family":"H\u00f6lzl","sequence":"first","affiliation":[{"name":"Institute of Networks and Security, Linz, Austria"}]},{"given":"Michael","family":"Roland","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Upper Austria, Hagenberg, Austria"}]},{"given":"Omid","family":"Mir","sequence":"additional","affiliation":[{"name":"Institute of Networks and Security, Linz, Austria"}]},{"given":"Ren\u00e9","family":"Mayrhofer","sequence":"additional","affiliation":[{"name":"Institute of Networks and Security, Linz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2018,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.13"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. EUROCRYPT '97","volume":"1233","author":"Baric Niko","year":"1997"},{"volume-title":"Proc. EUROCRYPT '93","year":"1993","author":"Benaloh Josh","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030106"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314337"},{"volume-title":"Financial Cryptography and Data Security. LNCS","author":"Bringer Julien","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49301-4_28"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994625"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_27"},{"key":"e_1_3_2_1_12_1","volume-title":"LNCS","volume":"2442","author":"Camenisch Jan","year":"2002"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/646762.706305"},{"key":"e_1_3_2_1_14_1","volume-title":"LNCS","volume":"547","author":"Chaum David","year":"1991"},{"volume-title":"Information Security. LNCS","author":"Goodrich Michael T.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJPCC-09-2015-0032"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2536853.2536947"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813602"},{"volume-title":"Bart De Decker, and Vincent Naessens","year":"2011","author":"Lapon Jorn","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_34"},{"volume-title":"ICT Systems Security and Privacy Protection. LNCS","author":"Lueks Wouter","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.105"},{"volume-title":"Probability and Computing: Randomized Algorithms and Probabilistic Analysis","author":"Mitzenmacher Michael","key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511813603"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11908739_2"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368359"},{"volume-title":"Financial Cryptography. LNCS","author":"Sander Tomas","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.14"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315256"}],"event":{"name":"SAC 2018: Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Pau France","acronym":"SAC 2018"},"container-title":["Proceedings of the 33rd Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167132.3167303","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167132.3167303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:27:00Z","timestamp":1750213620000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167132.3167303"}},"subtitle":["practical and scalable revocation of mobile eIDs"],"short-title":[],"issued":{"date-parts":[[2018,4,9]]},"references-count":28,"alternative-id":["10.1145\/3167132.3167303","10.1145\/3167132"],"URL":"https:\/\/doi.org\/10.1145\/3167132.3167303","relation":{},"subject":[],"published":{"date-parts":[[2018,4,9]]},"assertion":[{"value":"2018-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}