{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T00:36:38Z","timestamp":1728174998796},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540573401"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48071-4_7","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:23:49Z","timestamp":1186363429000},"page":"89-105","source":"Crossref","is-referenced-by-count":596,"title":["Wallet Databases with Observers"],"prefix":"10.1007","author":[{"given":"David","family":"Chaum","sequence":"first","affiliation":[]},{"given":"Torben Pryds","family":"Pedersen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology \u2014 proceedings of CRYPTO 88","author":"D. Chaum","year":"1990","unstructured":"D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Advances in Cryptology \u2014 proceedings of CRYPTO 88, Lecture Notes in Computer Science. pages 319\u2013327. Springer-Verlag, 1990."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"D. Chaum. Blind signature systems. In Advances in Cryptology \u2014 proceedings of CRYPTO 83, 1984.","DOI":"10.1007\/978-1-4684-4730-9_14"},{"key":"7_CR3","series-title":"Lect Notes Comput Sci","first-page":"186","volume-title":"Advances in Cryptology \u2014 proceedings of EUROCRYPT 86","author":"A. Fiat","year":"1987","unstructured":"A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology \u2014 proceedings of EUROCRYPT 86, Lecture Notes in Computer Science, pages 186\u2013194. Springer-Verlag, 1987."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"U. Feige and A. Shamir. Witness indistinguishable and witness hiding protocols. In Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, pages 416\u2013426, 1990.","DOI":"10.1145\/100216.100272"},{"issue":"2","key":"7_CR5","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen message attack. SIAM Journal on Computing, 17(2):281\u2013308, April 1988.","journal-title":"SIAM Journal on Computing"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48071-4_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:23Z","timestamp":1605647723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48071-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540573401"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/3-540-48071-4_7","relation":{},"subject":[]}}