{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T19:40:09Z","timestamp":1742845209313,"version":"3.40.2"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031865985","type":"print"},{"value":"9783031865992","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-86599-2_12","type":"book-chapter","created":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T19:16:23Z","timestamp":1742843783000},"page":"349-384","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Batch Anonymous MAC Tokens from\u00a0Lattices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9415-7935","authenticated-orcid":false,"given":"Yingfei","family":"Yan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7306-453X","authenticated-orcid":false,"given":"Sherman S. M.","family":"Chow","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3662-3237","authenticated-orcid":false,"given":"Lucien K. L.","family":"Ng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0443-2041","authenticated-orcid":false,"given":"Harry W. H.","family":"Wong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7380-3806","authenticated-orcid":false,"given":"Yongjun","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2554-4464","authenticated-orcid":false,"given":"Baocang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,15]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","unstructured":"Ajtai, M.: Generating hard instances of lattice problems (extended abstract). In: Miller, G.L. (ed.) Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, 22-24 May 1996, pp. 99\u2013108. ACM (1996), https:\/\/doi.org\/10.1145\/237814.237838","DOI":"10.1145\/237814.237838"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-030-75248-4_10","volume-title":"Public-Key Cryptography \u2013 PKC 2021","author":"MR Albrecht","year":"2021","unstructured":"Albrecht, M.R., Davidson, A., Deo, A., Smart, N.P.: Round-optimal verifiable oblivious pseudorandom functions from ideal lattices. In: Garay, J.A. (ed.) PKC 2021. LNCS, vol. 12711, pp. 261\u2013289. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75248-4_10"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Albrecht, M.R., Player, R., Scott, S.: On the concrete hardness of learning with errors. J. Math. Cryptol. 9(3), 169\u2013203 (2015), http:\/\/www.degruyter.com\/view\/j\/jmc.2015.9.issue-3\/jmc-2015-0016\/jmc-2015-0016.xml","DOI":"10.1515\/jmc-2015-0016"},{"key":"12_CR4","doi-asserted-by":"publisher","unstructured":"Amjad, G., Yeo, K., Yung, M.: RSA blind signatures with public metadata. Proc. Priv. Enhancing Technol. 2025(1), 37\u201357 (2025). https:\/\/doi.org\/10.56553\/popets-2025-0004","DOI":"10.56553\/popets-2025-0004"},{"key":"12_CR5","doi-asserted-by":"publisher","unstructured":"Argo, S., G\u00fcneysu, T., Jeudy, C., Land, G., Roux-Langlois, A., Sanders, O.: Practical post-quantum signatures for privacy. In: Luo, B., Liao, X., Xu, J., Kirda, E., Lie, D. (eds.) Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, 14-18 October 2024, pp. 1523\u20131537. ACM (2024), https:\/\/doi.org\/10.1145\/3658644.3670297","DOI":"10.1145\/3658644.3670297"},{"issue":"2","key":"12_CR6","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1109\/JSYST.2012.2221931","volume":"7","author":"MH Au","year":"2013","unstructured":"Au, M.H., Susilo, W., Mu, Y., Chow, S.: Constant-size dynamic $$k$$-times anonymous authentication. IEEE Syst. J. 7(2), 249\u2013261 (2013). https:\/\/doi.org\/10.1109\/JSYST.2012.2221931","journal-title":"IEEE Syst. J."},{"key":"12_CR7","unstructured":"Avanzi, R., et al.: CRYSTALS-Kyber: Algorithm specifications and supporting documentation (2021)"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-662-44371-2_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"A Banerjee","year":"2014","unstructured":"Banerjee, A., Peikert, C.: New and improved key-homomorphic pseudorandom functions. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 353\u2013370. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44371-2_20"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-3-319-98113-0_20","volume-title":"Security and Cryptography for Networks","author":"C Baum","year":"2018","unstructured":"Baum, C., Damg\u00e5rd, I., Lyubashevsky, V., Oechsner, S., Peikert, C.: More efficient commitments from structured lattice assumptions. In: Catalano, D., De Prisco, R. (eds.) SCN 2018. LNCS, vol. 11035, pp. 368\u2013385. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98113-0_20"},{"key":"12_CR10","unstructured":"Ben-Sasson, E., Bentov, I., Horesh, Y., Riabzev, M.: Scalable, transparent, and post-quantum secure computational integrity. IACR Cryptol. ePrint Arch. 2018\/046 (2018). http:\/\/eprint.iacr.org\/2018\/046"},{"key":"12_CR11","unstructured":"Benhamouda, F., Lepoint, T., Orr\u00f9, M., Raykova, M.: Publicly verifiable anonymous tokens with private metadata bit. IACR Cryptol. ePrint Arch. 2022\/004 (2022). https:\/\/eprint.iacr.org\/2022\/004"},{"key":"12_CR12","doi-asserted-by":"publisher","unstructured":"Beullens, W., Lyubashevsky, V., Nguyen, N.K., Seiler, G.: Lattice-based blind signatures: short, efficient, and round-optimal. In: Meng, W., Jensen, C.D., Cremers, C., Kirda, E. (eds.) Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, 26-30 November 2023, pp. 16\u201329. ACM (2023), https:\/\/doi.org\/10.1145\/3576915.3616613","DOI":"10.1145\/3576915.3616613"},{"key":"12_CR13","doi-asserted-by":"publisher","unstructured":"Bos, J.W., et al.: CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, 24-26 April 2018, pp. 353\u2013367. IEEE (2018) .https:\/\/doi.org\/10.1109\/EuroSP.2018.00032","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"12_CR14","doi-asserted-by":"publisher","unstructured":"Chase, M., Durak, F.B., Vaudenay, S.: Anonymous tokens with stronger metadata bit hiding from algebraic MACs. In: Handschuh, H., Lysyanskaya, A. (eds.) Advances in Cryptology - CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, 20-24 August 2023, Proceedings, Part II. LNCS, vol. 14082, pp. 418\u2013449. Springer (2023), https:\/\/doi.org\/10.1007\/978-3-031-38545-2_14","DOI":"10.1007\/978-3-031-38545-2_14"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-00468-1_15","volume-title":"Public Key Cryptography \u2013 PKC 2009","author":"S Chow","year":"2009","unstructured":"Chow, S.: Removing escrow from identity-based encryption. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 256\u2013276. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00468-1_15"},{"key":"12_CR16","unstructured":"Chow, S.S.M.: New Privacy-Preserving Architectures for Identity-\/Attribute-based Encryption. Ph.D. thesis, New York University, USA (2010). https:\/\/dl.acm.org\/doi\/10.5555\/2049343"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/11506157_27","volume-title":"Information Security and Privacy","author":"S Chow","year":"2005","unstructured":"Chow, S., Hui, L., Yiu, S.M., Chow, K.P.: Two improved partially blind signature schemes from bilinear pairings. In: Boyd, C., Gonz\u00e1lez Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 316\u2013328. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11506157_27"},{"key":"12_CR18","doi-asserted-by":"publisher","unstructured":"Chow, S.S.M., Ma, J.P.K., Yuen, T.H.: Scored anonymous credentials. In: Tibouchi, M., Wang, X. (eds.) Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, 19-22 June 2023, Proceedings, Part II. LNCS, vol. 13906, pp. 484\u2013515. Springer (2023), https:\/\/doi.org\/10.1007\/978-3-031-33491-7_18","DOI":"10.1007\/978-3-031-33491-7_18"},{"key":"12_CR19","doi-asserted-by":"publisher","unstructured":"Chu, H., Do, K., Hanzlik, L.: On the security of rate-limited Privacy Pass. In: Meng, W., Jensen, C.D., Cremers, C., Kirda, E. (eds.) Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, 26-30 November 2023, pp. 2871\u20132885. ACM (2023), https:\/\/doi.org\/10.1145\/3576915.3616619","DOI":"10.1145\/3576915.3616619"},{"key":"12_CR20","doi-asserted-by":"publisher","unstructured":"Davidson, A., Goldberg, I., Sullivan, N., Tankersley, G., Valsorda, F.: Privacy pass: bypassing internet challenges anonymously. Proc. Priv. Enhancing Technol. 2018(3), 164\u2013180 (2018), https:\/\/doi.org\/10.1515\/popets-2018-0026","DOI":"10.1515\/popets-2018-0026"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-40041-4_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"L Ducas","year":"2013","unstructured":"Ducas, L., Durmus, A., Lepoint, T., Lyubashevsky, V.: Lattice signatures and bimodal gaussians. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 40\u201356. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_3"},{"key":"12_CR22","unstructured":"Ducas, L., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., Stehl\u00e9, D.: CRYSTALS - Dilithium: Digital signatures from module lattices. IACR Cryptol. ePrint Arch. 2017\/633 (2017). http:\/\/eprint.iacr.org\/2017\/633"},{"key":"12_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-030-29962-0_6","volume-title":"Computer Security \u2013 ESORICS 2019","author":"K Emura","year":"2019","unstructured":"Emura, K., Katsumata, S., Watanabe, Y.: Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices. In: Sako, K., Schneider, S., Ryan, P. (eds.) ESORICS 2019. LNCS, vol. 11736, pp. 113\u2013133. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29962-0_6"},{"key":"12_CR24","unstructured":"Hendrickson, S., Iyengar, J., Pauly, T., Valdez, S., Wood., C.A.: Rate-limited token issuance protocol (2022). https:\/\/www.ietf.org\/archive\/id\/draft-ietf-privacypass-rate-limit-tokens-00.txt"},{"key":"12_CR25","unstructured":"Henry, R.: Efficient Zero-Knowledge Proofs and Applications. Ph.D. thesis, University of Waterloo, Ontario, Canada (2014). https:\/\/hdl.handle.net\/10012\/8621"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-662-45608-8_13","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"S Jarecki","year":"2014","unstructured":"Jarecki, S., Kiayias, A., Krawczyk, H.: Round-optimal password-protected secret sharing and T-PAKE in the password-only model. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8874, pp. 233\u2013253. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45608-8_13"},{"key":"12_CR27","unstructured":"Jeudy, C., Sanders, O.: Improved lattice blind signatures from recycled entropy (2024). https:\/\/eprint.iacr.org\/2024\/1289"},{"key":"12_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-030-56784-2_11","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"B Kreuter","year":"2020","unstructured":"Kreuter, B., Lepoint, T., Orr\u00f9, M., Raykova, M.: Anonymous tokens with private metadata bit. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12170, pp. 308\u2013336. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56784-2_11"},{"key":"12_CR29","doi-asserted-by":"publisher","unstructured":"Langlois, A., Stehl\u00e9, D.: Worst-case to average-case reductions for module lattices. Des. Codes Cryptogr. 75(3), 565\u2013599 (2015). https:\/\/doi.org\/10.1007\/s10623-014-9938-4","DOI":"10.1007\/s10623-014-9938-4"},{"key":"12_CR30","unstructured":"Lu, X., Fan, J., Au, M.H.: Relaxed lattice-based programmable hash functions: New efficient adaptively secure IBEs. IACR Cryptol. ePrint Arch. 2024\/1535 (2024). https:\/\/eprint.iacr.org\/2024\/1535"},{"key":"12_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1007\/978-3-642-29011-4_43","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"V Lyubashevsky","year":"2012","unstructured":"Lyubashevsky, V.: Lattice signatures without trapdoors. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 738\u2013755. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29011-4_43"},{"key":"12_CR32","doi-asserted-by":"publisher","unstructured":"Lyubashevsky, V., Nguyen, N.K.: BLOOM: bimodal lattice one-out-of-many proofs and applications. In: Agrawal, S., Lin, D. (eds.) Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, 5-9 December 2022, Proceedings, Part IV. LNCS, vol. 13794, pp. 95\u2013125. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-22972-5_4","DOI":"10.1007\/978-3-031-22972-5_4"},{"key":"12_CR33","doi-asserted-by":"publisher","unstructured":"Lyubashevsky, V., Nguyen, N.K., Plan\u00e7on, M.: Lattice-based zero-knowledge proofs and applications: Shorter, simpler, and more general. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, 15-18 August 2022, Proceedings, Part II. LNCS, vol. 13508, pp. 71\u2013101. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-15979-4_3","DOI":"10.1007\/978-3-031-15979-4_3"},{"key":"12_CR34","doi-asserted-by":"publisher","unstructured":"Lyubashevsky, V., Seiler, G., Steuer, P.: The LaZer library: lattice-based zero knowledge and succinct proofs for quantum-safe privacy. In: Luo, B., Liao, X., Xu, J., Kirda, E., Lie, D. (eds.) Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, 14-18 October 2024. pp. 3125\u20133137. ACM (2024). https:\/\/doi.org\/10.1145\/3658644.3690330","DOI":"10.1145\/3658644.3690330"},{"key":"12_CR35","doi-asserted-by":"publisher","unstructured":"Ma, J.P.K., Chow, S.S.M.: SMART credentials in the multi-queue of slackness (or Secure management of anonymous reputation traits without global halting). In: 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023, Delft, Netherlands, 3-7 July 2023, pp. 896\u2013912. IEEE (2023). https:\/\/doi.org\/10.1109\/EuroSP57164.2023.00057","DOI":"10.1109\/EuroSP57164.2023.00057"},{"key":"12_CR36","doi-asserted-by":"publisher","unstructured":"Ng, L.K.L., Chow, S.S.M., Wong, D.P.H., Woo, A.P.Y.: LDSP: shopping with cryptocurrency privately and quickly under leadership. In: 41st IEEE International Conference on Distributed Computing Systems, ICDCS 2021, Washington DC, USA, 7-10 July 2021. pp. 261\u2013271. IEEE (2021). https:\/\/doi.org\/10.1109\/ICDCS51616.2021.00033","DOI":"10.1109\/ICDCS51616.2021.00033"},{"key":"12_CR37","unstructured":"Orr\u00f9, M.: Revisiting keyed-verification anonymous credentials. IACR Cryptol. ePrint Arch. 2024\/1552 (2024). https:\/\/eprint.iacr.org\/2024\/1552"},{"key":"12_CR38","unstructured":"Policharla, G., Westerbaan, B., Faz-Hern\u00e1ndez, A., Wood, C.A.: Post-quantum Privacy Pass via post-quantum anonymous credentials. IACR Cryptol. ePrint Arch. 2023\/414 (2023). https:\/\/eprint.iacr.org\/2023\/414"},{"key":"12_CR39","doi-asserted-by":"publisher","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R. (eds.) Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, 22-24 May 2005, pp. 84\u201393. ACM (2005). https:\/\/doi.org\/10.1145\/1060590.1060603","DOI":"10.1145\/1060590.1060603"},{"key":"12_CR40","unstructured":"Schwartz, B.M., Salowey, J.A., Wouters, P.: IETF data tracker: Privacy Pass. https:\/\/datatracker.ietf.org\/wg\/privacypass\/about"},{"key":"12_CR41","unstructured":"Seiler, G.: Faster AVX2 optimized NTT multiplication for ring-LWE lattice cryptography. IACR Cryptol. ePrint Arch. 2018\/039 (2018). http:\/\/eprint.iacr.org\/2018\/039"},{"key":"12_CR42","doi-asserted-by":"publisher","unstructured":"Silde, T., Strand, M.: Anonymous tokens with public metadata and applications to private contact tracing. In: Eyal, I., Garay, J.A. (eds.) Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, 2-6 May 2022, Revised Selected Papers. LNCS, vol. 13411, pp. 179\u2013199. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-18283-9_9","DOI":"10.1007\/978-3-031-18283-9_9"},{"key":"12_CR43","doi-asserted-by":"publisher","unstructured":"Sui, A.F., et al.: Separable and anonymous identity-based key issuing. In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, 20-22 July 2005. pp. 275\u2013279. IEEE Computer Society (2005). https:\/\/doi.org\/10.1109\/ICPADS.2005.263","DOI":"10.1109\/ICPADS.2005.263"},{"key":"12_CR44","doi-asserted-by":"publisher","unstructured":"Tyagi, N., Celi, S., Ristenpart, T., Sullivan, N., Tessaro, S., Wood, C.A.: A fast and simple partially oblivious PRF, with applications. In: Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, 30 May - 3 June 2022, Proceedings, Part II. LNCS, vol. 13276, pp. 674\u2013705. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-07085-3_23","DOI":"10.1007\/978-3-031-07085-3_23"},{"key":"12_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-030-78372-3_16","volume-title":"Applied Cryptography and Network Security","author":"X Wang","year":"2021","unstructured":"Wang, X., Wong, H., Chow, S.: Access control encryption from group encryption. In: Sako, K., Tippenhauer, N.O. (eds.) ACNS 2021. LNCS, vol. 12726, pp. 417\u2013441. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78372-3_16"},{"key":"12_CR46","unstructured":"Yan, Y., Chow, S.S.M., Ng, L.K.L., Wong, H.W.H., Zhao, Y., Wang, B.: Batch anonymous MAC tokens from lattices. https:\/\/github.com\/YanYingfei\/KVAT (2025), source code"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-86599-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T19:17:07Z","timestamp":1742843827000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-86599-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031865985","9783031865992"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-86599-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pqcrypto2025.iis.sinica.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}