{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T14:51:43Z","timestamp":1649083903598},"reference-count":6,"publisher":"The Japan Society for Industrial and Applied Mathematics","issue":"0","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSIAM Letters"],"published-print":{"date-parts":[[2009]]},"DOI":"10.14495\/jsiaml.1.28","type":"journal-article","created":{"date-parts":[[2013,12,5]],"date-time":"2013-12-05T01:17:19Z","timestamp":1386206239000},"page":"28-31","source":"Crossref","is-referenced-by-count":0,"title":["Computational and Symbolic Anonymity in an Unbounded Network"],"prefix":"10.14495","volume":"1","author":[{"given":"Hubert","family":"Comon-Lundh","sequence":"first","affiliation":[{"name":"Ecole Normale Sup\u00e9rieure de Cachan"},{"name":"Research Center for Information Security, National Institute of Advanced Industrial Science and Technology"}]},{"given":"Yusuke","family":"Kawamoto","sequence":"additional","affiliation":[{"name":"Graduate School of Information Science and Technology, The University of Tokyo"}]},{"given":"Hideki","family":"Sakurada","sequence":"additional","affiliation":[{"name":"NTT Communication Science Laboratories, NTT Corporation"}]}],"member":"5623","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] M. Abadi and P. Rogaway, Reconciling two views of cryptography (the computational soundness of formal encryption), J. Cryptology, series 15 (2) (2002), 103-127.","DOI":"10.1007\/s00145-001-0014-7"},{"key":"2","unstructured":"[2] Y. Kawamoto, H. Sakurada and M. Hagiya, Computationally sound symbolic anonymity of a ring signature, in: Proc. FCS-ARSPA-WITS'08, pp. 161-175, 2008."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] H. Comon-Lundh and V. Cortier, Computational soundness of observational equivalence, in: Proc. CCS'08, pp. 109-118, ACM, 2008.","DOI":"10.1145\/1455770.1455786"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] A. Bender, J. Katz and R. Morselli, Ring signatures: Stronger definitions, and constructions without random oracles, in: Theory of Cryptography, Proc. TCC'06, Lect. Notes Comp. Sci., pp. 60-79, Springer-Verlag, 2006.","DOI":"10.1007\/11681878_4"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] M. Backes and D. Unruh, Computational soundness of symbolic zero-knowledge proofs against active attackers, in: Proc. CSF'08, pp. 255-269, IEEE Computer Society, 2008.","DOI":"10.1109\/CSF.2008.20"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] M. Abadi and C. Fournet, Mobile values, new names, and secure communication, in: Proc. POPL'01, pp. 104-115, ACM, 2001.","DOI":"10.1145\/373243.360213"}],"container-title":["JSIAM Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/jsiaml\/1\/0\/1_0_28\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T03:52:54Z","timestamp":1618199574000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/jsiaml\/1\/0\/1_0_28\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":6,"journal-issue":{"issue":"0","published-print":{"date-parts":[[2009]]}},"URL":"https:\/\/doi.org\/10.14495\/jsiaml.1.28","relation":{},"ISSN":["1883-0609","1883-0617"],"issn-type":[{"value":"1883-0609","type":"print"},{"value":"1883-0617","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}