{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T09:00:53Z","timestamp":1762160453251,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540328803"},{"type":"electronic","value":"9783540328810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11685654_7","type":"book-chapter","created":{"date-parts":[[2006,3,10]],"date-time":"2006-03-10T13:49:06Z","timestamp":1141998546000},"page":"164-186","source":"Crossref","is-referenced-by-count":58,"title":["How to Leak a Secret: Theory and Applications of Ring Signatures"],"prefix":"10.1007","author":[{"given":"Ronald L.","family":"Rivest","sequence":"first","affiliation":[]},{"given":"Adi","family":"Shamir","sequence":"additional","affiliation":[]},{"given":"Yael","family":"Tauman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Awasthi, A.K., Lal, S.: ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings. In: Cryptology ePrint Archive: Report 2004\/184"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-540-27809-2_19","volume-title":"Financial Cryptography","author":"G. Ateniese","year":"2004","unstructured":"Ateniese, G., de Medeiros, B.: Identity-based chameleon hash and applications. In: Juels, A. (ed.) FC 2004. LNCS, vol.\u00a03110, pp. 164\u2013180. Springer, Heidelberg (2004)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/3-540-36178-2_26","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"M. Abe","year":"2002","unstructured":"Abe, M., Ohkubo, M., Suzuki, K.: 1-out-of- n Signatures from a Variety of Keys. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 415\u2013432. Springer, Heidelberg (2002)"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verfiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 416\u2013432. Springer, Heidelberg (2003)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random Oracles are Practical: a Paradigm for Designing Efficient Protocols. In: ACM Conference on Computer and Communications Security, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/3-540-45708-9_30","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"E. Bresson","year":"2002","unstructured":"Bresson, E., Stern, J., Szydlo, M.: Threshold Ring Signatures and Applications to Ad-Hoc Groups (Extended abstract). In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 465\u2013480. Springer, Heidelberg (2002)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/3-540-69053-0_32","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"J. Camenisch","year":"1997","unstructured":"Camenisch, J.: Efficient and Generalzied Group Sigmatures. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 465\u2013479. Springer, Heidelberg (1997)"},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"issue":"1","key":"7_CR9","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"D. Chaump","year":"1988","unstructured":"Chaump, D.: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology\u00a01(1), 65\u201375 (1988)","journal-title":"Journal of Cryptology"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-48658-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"R. Cramer","year":"1994","unstructured":"Cramer, R., Damg\u00e5rd, I., Schoenmakers, B.: Proofs of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 174\u2013187. Springer, Heidelberg (1994)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M., Hui, L.C.K., Yiu, S.M.: Identity Based Threshold Ring Signature. In Cryptology ePrint Archive: Report 2004\/179","DOI":"10.1007\/11496618_17"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., Van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Chow, S.S.M., Yiu, S.M., Hui, L.C.K.: Efficient Identity Based Ring Signature. In Cryptology ePrint Archive: Report 2004\/327","DOI":"10.1007\/11496618_17"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory\u00a0IT-22, 644\u2013654 (1976)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-540-24676-3_36","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Kiayias, A., Nicolosi, A., Shoup, V.: Anonymous Identification in Ad-Hoc Groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 609\u2013626. Springer, Heidelberg (2004)"},{"key":"7_CR16","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography: Volume 2 \u2013 Basic Applications","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: Foundations of Cryptography: Volume 2 \u2013 Basic Applications. Cambridge University Press, Cambridge (2004)"},{"issue":"2","key":"7_CR17","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D.M. Goldschlag","year":"1999","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM\u00a042(2), 39\u201341 (1999)","journal-title":"Communications of the ACM"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Herranz, J.: A Formal Proof of Security of Zhang and Kim\u2019s ID-Based Ring Signature Scheme. In: WOSIS 2004, pp. 63\u201372 (2004)","DOI":"10.5220\/0002661000630072"},{"key":"7_CR19","unstructured":"Hanatani, Y., Ohta, K.: Two Stories of Ring Signatures. Crypto 2005 rump session talk, Available at http:\/\/www.iacr.org\/conferences\/crypto2005\/r\/38.ppt , A photo of the 1756 \u201dring signature\u201d is available at http:\/\/www.nihonkoenmura.jp\/theme3\/takarabito07.htm"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Herranz, J., Saez, G.: Forking Lemmas in the Ring Signatures\u2019 Scenario. In: Cryptology ePrint Archive: Report 2003\/067","DOI":"10.1007\/978-3-540-24582-7_20"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-540-30496-8_6","volume-title":"Security in Ad-hoc and Sensor Networks","author":"J. Herranz","year":"2005","unstructured":"Herranz, J., Saez, G.: Ring Signature Schemes for General Ad-Hoc Access Structures. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol.\u00a03313, pp. 54\u201365. Springer, Heidelberg (2005)"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-540-30191-2_3","volume-title":"Information and Communications Security","author":"J. Herranz","year":"2004","unstructured":"Herranz, J., Saez, G.: New Identity-Based Ring Signature Schemes. In: L\u00f3pez, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol.\u00a03269, pp. 27\u201339. Springer, Heidelberg (2004)"},{"key":"7_CR23","unstructured":"Herranz, J., Saez, G.: Distributed Ring Signatures for Identity-Based Scenarios. In: Cryptology ePrint Archive: Report 2004\/190"},{"key":"7_CR24","unstructured":"Hardy, G.H., Wright, E.M.: An Introduction to the Theory of Numbers, 5th edn. Oxford (1979)"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/3-540-68339-9_13","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Jakobsson","year":"1996","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 143\u2013154. Springer, Heidelberg (1996)"},{"key":"7_CR26","unstructured":"Kuwakado, H., Tanaka, H.: Threshold Ring Signature Scheme Based on the Curve. IPSJ JOURNAL Abstract, 44, 8\u201332"},{"issue":"2","key":"7_CR27","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1137\/0217022","volume":"17","author":"M. Luby","year":"1988","unstructured":"Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Computing\u00a017(2), 373\u2013386 (1988)","journal-title":"SIAM J. Computing"},{"key":"7_CR28","unstructured":"Lv, J., Ren, K., Chen, X., Kim, K.: Ring Authenticated Encryption: A New Type of Authenticated Encryption. In: The 2004 Symposium on Cryptography and Information Security, vol.\u00a01(2), pp. 1179\u20131184 (2004)"},{"key":"7_CR29","unstructured":"Lin, C.Y., Wu, T.C.: An Identity Based Ring Signature Scheme from Bilinear Pairings. In: Cryptology ePrint Archive, Report 2003\/117 (2003)"},{"key":"7_CR30","unstructured":"Lv, J., Wang, X.: Verifiable Ring Signature. In: Proc. of DMS 2003 - The 9th International Conference on Distribted Multimedia Systems, pp. 663\u2013667 (2003)"},{"key":"7_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-540-24691-6_2","volume-title":"Information Security and Cryptology - ICISC 2003","author":"J.K. Liu","year":"2004","unstructured":"Liu, J.K., Wei, V.K., Wong, D.S.: Wong A Separable Threshold Ring Signature Scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 12\u201326. Springer, Heidelberg (2004)"},{"key":"7_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-27800-9_28","volume-title":"Information Security and Privacy","author":"J.K. Liu","year":"2004","unstructured":"Liu, J.K., Wei, V.K., Wong, D.S.: Linkable Spontaneous Anonymous Group Signatures for Ad Hoc Groups (Extended Abstract). In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 325\u2013335. Springer, Heidelberg (2004)"},{"key":"7_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/3-540-45708-9_31","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"M. Naor","year":"2002","unstructured":"Naor, M.: Deniable Ring Authentication. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 481\u2013498. Springer, Heidelberg (2002)"},{"key":"7_CR34","unstructured":"Rabin, M.: Digitalized signatures as intractable as factorization. Technical Report MIT\/LCS\/TR-212, MIT Laboratory for Computer Science (January 1979)"},{"issue":"2","key":"7_CR35","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"7_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"7_CR37","first-page":"454","volume-title":"Proc. 35th FOCS","author":"A. Santis De","year":"1994","unstructured":"De Santis, A., Di Crescenzo, G., Persiano, G., Yung, M.: On monotone formula closure of SZK. In: Proc. 35th FOCS, pp. 454\u2013465. IEEE, New York (1994)"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Susilo, W., Mu, Y.: Non-Interactive Deniable Ring Authentication. In: the 6th International Conference on Information Security and Cryptology ICISC 2003, pp. 397\u2013412 (2003)","DOI":"10.1007\/978-3-540-24691-6_29"},{"key":"7_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-540-24852-1_11","volume-title":"Applied Cryptography and Network Security","author":"W. Susilo","year":"2004","unstructured":"Susilo, W., Mu, Y.: Deniable Ring Authentication Revisited. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol.\u00a03089, pp. 149\u2013163. Springer, Heidelberg (2004)"},{"key":"7_CR40","unstructured":"Tang, C., Liu, Z., Wang, M.: An Improved Identity-Based Ring Signature Scheme from Bilinear Pairings. In: NM Research Preprints, MMRC, AMSS, Academia, Sinica, No. 22, Beijing, pp. 231\u2013234 (December 2003)"},{"key":"7_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-540-30556-9_30","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"P.P. Tsang","year":"2004","unstructured":"Tsang, P.P., Wei, V.K., Chan, T.K., Au, M.H., Liu, J.K., Wong, D.S.: Separable Linkable Threshold Ring Signatures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.\u00a03348, pp. 384\u2013398. Springer, Heidelberg (2004)"},{"key":"7_CR42","unstructured":"Wei, V.K.: A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. In: Cryptology ePrint Archive: Report 2004\/039"},{"key":"7_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-540-39927-8_4","volume-title":"Information and Communications Security","author":"D.S. Wong","year":"2003","unstructured":"Wong, D.S., Fung, K., Liu, J.K., Wei, V.K.: On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol.\u00a02836, pp. 34\u201346. Springer, Heidelberg (2003)"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Xu, S., Yung, M.: Accountable Ring Signatures: A Smart Card Approach. In: Sixth Smart Card Research and Advanced Application IFIP Conference, pp. 271\u2013286","DOI":"10.1007\/1-4020-8147-2_18"},{"key":"7_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/3-540-36178-2_33","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"F. Zhang","year":"2002","unstructured":"Zhang, F., Kim, K.: ID-Based Blind Signature and Ring Signature from Pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 533\u2013547. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Theoretical Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11685654_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T23:51:30Z","timestamp":1736293890000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11685654_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540328803","9783540328810"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/11685654_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}