{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:21:23Z","timestamp":1725790883762},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319053011"},{"type":"electronic","value":"9783319053028"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05302-8_15","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T10:31:24Z","timestamp":1395311484000},"page":"247-263","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Computational Soundness of Symbolic Blind Signatures under Active Attacker"],"prefix":"10.1007","author":[{"given":"Hideki","family":"Sakurada","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s00145-001-0014-7","volume":"15","author":"M Abadi","year":"2002","unstructured":"Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology 15(2), 103\u2013127 (2002)","journal-title":"J. Cryptology"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Hofheinz, D., Unruh, D.: CoSP: a general framework for computational soundness proofs. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) ACM Conference on Computer and Communications Security. pp. 66\u201378. ACM (2009)","DOI":"10.1145\/1653662.1653672"},{"issue":"3","key":"15_CR3","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s00145-002-0120-1","volume":"16","author":"M Bellare","year":"2003","unstructured":"Bellare, M., Namprempre, C., Pointcheval, D., Semanko, M.: The one-more-RSA-inversion problems and the security of chaum\u2019s blind signature scheme. J. Cryptology 16(3), 185\u2013215 (2003)","journal-title":"J. Cryptology"},{"key":"15_CR4","series-title":"LNCS","first-page":"31","volume-title":"PKC 2003","author":"A Boldyreva","year":"2003","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In: Desmedt, Y. (ed.) PKC 2003. LNCS, vol. 2567, pp. 31\u201346. Springer, Heidelberg (2003)"},{"key":"15_CR5","first-page":"199","volume-title":"CRYPTO","author":"D Chaum","year":"1982","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) CRYPTO, pp. 199\u2013203. Plenum Press, New York (1982)"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/1455770.1455786","volume-title":"In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS\u201908","author":"H Comon-Lundh","year":"2008","unstructured":"Comon-Lundh, H., Cortier, V.: Computational soundness of observational equivalence. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS\u201908, pp. 109\u2013118. ACM, New York (2008)"},{"key":"15_CR7","series-title":"LNCS","first-page":"63","volume-title":"ISPEC 2012","author":"H Comon-Lundh","year":"2012","unstructured":"Comon-Lundh, H., Hagiya, M., Kawamoto, Y., Sakurada, H.: Computational soundness of indistinguishability properties without computable parsing. In: Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 63\u201379. Springer, Heidelberg (2012)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Cortier, V., Warinschi, B.: Computationally sound, automated proofs for security protocols. In: Sagiv [18], pp. 157\u2013171","DOI":"10.1007\/978-3-540-31987-0_12"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Cortier, V., Warinschi, B.: A composable computational soundness notion. In: Chen, Y., Danezis, G., Shmatikov, V. (eds.) ACM Conference on Computer and Communications Security. pp. 63\u201374. ACM (2011)","DOI":"10.1145\/2046707.2046717"},{"key":"15_CR10","series-title":"LNCS","first-page":"244","volume-title":"ASIACRYPT 1992","author":"A Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Seberry, J., Zheng, Y. (eds.) ASIACRYPT 1992. LNCS, vol. 718, pp. 244\u2013251. Springer, Heidelberg (1993)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Janvier, R., Lakhnech, Y., Mazar\u00e9, L.: Completing the picture: soundness of formal encryption in the presence of active adversaries. In: Sagiv [18], pp. 172\u2013185","DOI":"10.1007\/978-3-540-31987-0_13"},{"key":"15_CR12","series-title":"LNCS","first-page":"150","volume-title":"CRYPTO 1997","author":"A Juels","year":"1997","unstructured":"Juels, A., Luby, M., Ostrovsky, R.: Security of blind digital signatures. In: Kaliski Jr, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 150\u2013164. Springer, Heidelberg (1997)"},{"key":"15_CR13","unstructured":"Kawamoto, Y., Sakurada, H., Hagiya, M.: Computationally sound symbolic anonymity of a ring signature. In: Proceedings of Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of, Security (FCS-ARSPA-WITS\u201908), June 2008, pp. 161\u2013175 (2008)"},{"key":"15_CR14","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-642-02002-5_9","volume-title":"Formal to practical security","author":"Y Kawamoto","year":"2009","unstructured":"Kawamoto, Y., Sakurada, H., Hagiya, M.: Computationally sound formalization of rerandomizable RCCA secure encryption. In: Cortier, V., Kirchner, C., Okada, M., Sakurada, H. (eds.) Formal to practical security. LNCS, vol. 5458, pp. 158\u2013180. Springer, Heidelberg (2009)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi-calculus. In: Sagiv [18], pp. 186\u2013200","DOI":"10.1007\/978-3-540-31987-0_14"},{"key":"15_CR16","series-title":"LNCS","first-page":"133","volume-title":"TCC 2004","author":"D Micciancio","year":"2004","unstructured":"Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133\u2013151. Springer, Heidelberg (2004)"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptology 13, 361\u2013396 (2000)","journal-title":"J. Cryptology"},{"key":"15_CR18","series-title":"LNCS","volume-title":"ESOP 2005","year":"2005","unstructured":"Sagiv, S. (ed.): ESOP 2005. LNCS, vol. 3444. Springer, Heidelberg (2005)"},{"key":"15_CR19","unstructured":"Sakurada, H.: Computational soundness of symbolic blind signatures under active attacker (in preparation)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05302-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T12:16:47Z","timestamp":1674130607000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-05302-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319053011","9783319053028"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05302-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}