{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:08:27Z","timestamp":1743055707209,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031828515"},{"type":"electronic","value":"9783031828522"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82852-2_10","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:02:02Z","timestamp":1741784522000},"page":"230-236","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multivariate Blind Signatures Revisited"],"prefix":"10.1007","author":[{"given":"Ward","family":"Beullens","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"10_CR1","unstructured":"Baum, C., et al.: One tree to rule them all: optimizing GGM trees and OWFs for post-quantum signatures. Cryptology ePrint Archive, Paper 2024\/490 (2024). https:\/\/eprint.iacr.org\/2024\/490"},{"key":"10_CR2","unstructured":"Baum, C., et al.: FAEST, Technical report, National Institute of Standards and Technology (2023). https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/round-1-additional-signatures"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/978-3-031-38554-4_19","volume-title":"CRYPTO 2023, Part V","author":"C Baum","year":"2023","unstructured":"Baum, C., et al.: Publicly verifiable zero-knowledge and post-quantum signatures from VOLE-in-the-head. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO 2023, Part V. LNCS, vol. 14085, pp. 581\u2013615. Springer, Heidelberg (2023)"},{"key":"10_CR4","series-title":"LNCS","first-page":"348","volume-title":"EUROCRYPT 2021, Part I","author":"W Beullens","year":"2021","unstructured":"Beullens, W.: Improved cryptanalysis of UOV and rainbow. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021, Part I. LNCS, vol. 12696, pp. 348\u2013373. Springer, Heidelberg (2021)"},{"key":"10_CR5","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1007\/978-3-031-15979-4_16","volume-title":"CRYPTO 2022, Part II","author":"W Beullens","year":"2022","unstructured":"Beullens, W.: Breaking rainbow takes a weekend on a laptop. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO 2022, Part II. LNCS, vol. 13508, pp. 464\u2013479. Springer, Heidelberg (2022)"},{"key":"10_CR6","series-title":"LNCS","first-page":"355","volume-title":"SAC 2021","author":"W Beullens","year":"2022","unstructured":"Beullens, W.: MAYO: practical post-quantum signatures from oil-and-vinegar maps. In: AlTawy, R., H\u00fclsing, A. (eds.) SAC 2021. LNCS, vol. 13203, pp. 355\u2013376. Springer, Heidelberg (2022)"},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.46586\/tches.v2023.i3.321-365","volume":"2023","author":"W Beullens","year":"2023","unstructured":"Beullens, W., et al.: Oil and vinegar: modern parameters and implementations. IACR TCHES 2023(3), 321\u2013365 (2023)","journal-title":"IACR TCHES"},{"key":"10_CR8","series-title":"LNCS","first-page":"82","volume-title":"ACISP 07","author":"O Billet","year":"2007","unstructured":"Billet, O., Robshaw, M.J.B., Peyrin, T.: On building hash functions from multivariate quadratic equations. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 07. LNCS, vol. 4586, pp. 82\u201395. Springer, Heidelberg (2007)"},{"key":"10_CR9","first-page":"199","volume-title":"CRYPTO\u201982","author":"D Chaum","year":"1982","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) CRYPTO\u201982, pp. 199\u2013203. Plenum Press, New York, USA (1982)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Hoang Duong, D., Susilo, W., Tran, H.T.: A multivariate blind ring signature scheme. Comput. J. 63(8), 1194\u20131202 (2020)","DOI":"10.1093\/comjnl\/bxz128"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Juels, A., Luby, M., Ostrovsky, R.: Security of blind digital signatures (extended abstract). In: Burton, S., Kaliski, Jr. (eds.) CRYPTO\u201997. LNCS, vol. 1294, pp. 150\u2013164. Springer, Heidelberg (1997)","DOI":"10.1007\/BFb0052233"},{"key":"10_CR12","series-title":"LNCS","first-page":"206","volume-title":"EUROCRYPT\u201999","author":"A Kipnis","year":"1999","unstructured":"Kipnis, A., Patarin, J., Goubin, L.: Unbalanced oil and vinegar signature schemes. In: Stern, J. (ed.) EUROCRYPT\u201999. LNCS, vol. 1592, pp. 206\u2013222. Springer, Heidelberg (1999)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Omar, S., Padhye, S., Dey, D.: Multivariate partially blind signature scheme. In: Computational Intelligence, pp. 143\u2013155. Springer, Nature (2023)","DOI":"10.1007\/978-981-19-7346-8_13"},{"key":"10_CR14","series-title":"LNCS","first-page":"437","volume-title":"FC 2017","author":"A Petzoldt","year":"2017","unstructured":"Petzoldt, A., Szepieniec, A., Mohamed, M.S.E.: A practical multivariate blind signature scheme. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 437\u2013454. Springer, Heidelberg (2017)"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82852-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:02:08Z","timestamp":1741784528000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82852-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031828515","9783031828522"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82852-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montreal, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC24\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}