{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T18:10:07Z","timestamp":1743876607793,"version":"3.40.3"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031886607","type":"print"},{"value":"9783031886614","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-88661-4_7","type":"book-chapter","created":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T17:41:40Z","timestamp":1743874900000},"page":"149-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DSKE: Digital Signatures with\u00a0Key Extraction"],"prefix":"10.1007","author":[{"given":"Zhipeng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Orestis","family":"Alpos","sequence":"additional","affiliation":[]},{"given":"Alireza","family":"Kavousi","sequence":"additional","affiliation":[]},{"given":"Harry W. H.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Sze Yiu","family":"Chau","sequence":"additional","affiliation":[]},{"given":"Duc V.","family":"Le","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Cachin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,4]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Abraham, I., Jovanovic, P., Maller, M., Meiklejohn, S., Stern, G.: Bingo: adaptivity and asynchrony in verifiable secret sharing and distributed key generation. In: Advances in Cryptology - CRYPTO. Springer, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-38557-5_2","DOI":"10.1007\/978-3-031-38557-5_2"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., Thomas, M.: Domainkeys identified mail (dkim) signatures. Technical report, RFC 4871 (2007)","DOI":"10.17487\/rfc4871"},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Arun, A., Bonneau, J., Clark, J.: Short-lived zero-knowledge proofs and signatures. In: ASIACRYPT 2022. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-22969-5_17","DOI":"10.1007\/978-3-031-22969-5_17"},{"key":"7_CR4","unstructured":"Azouvi, S., Cachin, C., Le, D.V., Vukolic, M., Zanolini, L.: Modeling resources in permissionless longest-chain total-order broadcast. In: 26th International Conference on Principles of Distributed Systems, OPODIS 2022, Brussels, Belgium, 13\u201315 December 2022, vol. 253 of LIPIcs, pp. 19:1\u201319:23. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2022)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"902","DOI":"10.1007\/978-3-662-53890-6_30","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"F Baldimtsi","year":"2016","unstructured":"Baldimtsi, F., Kiayias, A., Zacharias, T., Zhang, B.: Indistinguishable proofs of work or knowledge. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10032, pp. 902\u2013933. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53890-6_30"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Beck, G., Choudhuri, A.R., Green, M., Jain, A., Tiwari, P.R.: Time-deniable signatures. In: Proceedings on Privacy Enhancing Technologies (2023)","DOI":"10.56553\/popets-2023-0071"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-48405-1_28","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"M Bellare","year":"1999","unstructured":"Bellare, M., Miner, S.K.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431\u2013448. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_28"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-662-54388-7_5","volume-title":"Public-Key Cryptography \u2013 PKC 2017","author":"M Bellare","year":"2017","unstructured":"Bellare, M., Poettering, B., Stebila, D.: Deterring certificate subversion: efficient double-authentication-preventing signatures. In: Fehr, S. (ed.) PKC 2017. LNCS, vol. 10175, pp. 121\u2013151. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54388-7_5"},{"key":"7_CR9","unstructured":"Blagoj. Private message sharing for eth2 validators (2021). https:\/\/ethresear.ch\/t\/private-message-sharing-for-eth2-validators\/10664"},{"key":"7_CR10","unstructured":"Blagoj. Rate limiting nullifier: A spam-protection mechanism for anonymous environments (2021). https:\/\/medium.com\/privacy-scaling-explorations\/rate-limiting-nullifier-a-spam-protection-mechanism-for-anonymous-environments-bbe4006a57d"},{"key":"7_CR11","unstructured":"Blagoj and WhiteHat Barry. Decentralised cloudflare - using rln and rich user identities (2021). https:\/\/ethresear.ch\/t\/decentralised-cloudflare-using-rln-and-rich-user-identities\/10774"},{"issue":"2","key":"7_CR12","first-page":"6","volume":"11","author":"SE Blythe","year":"2005","unstructured":"Blythe, S.E.: Digital signature law of the United Nations, European Union, United Kingdom and United States: promotion of growth in e-commerce with enhanced security. Richmond J. Law Technol. 11(2), 6 (2005)","journal-title":"Richmond J. Law Technol."},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/978-3-319-96884-1_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"D Boneh","year":"2018","unstructured":"Boneh, D., Bonneau, J., B\u00fcnz, B., Fisch, B.: Verifiable delay functions. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10991, pp. 757\u2013788. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_25"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-030-03329-3_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"D Boneh","year":"2018","unstructured":"Boneh, D., Drijvers, M., Neven, G.: Compact multi-signatures for smaller blockchains. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11273, pp. 435\u2013464. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_15"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514\u2013532. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_30"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communication, or, why not to use pgp. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pp. 77\u201384 (2004)","DOI":"10.1145\/1029179.1029200"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-642-21969-6_23","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"J Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., Ereth, S., H\u00fclsing, A., R\u00fcckert, M.: On the security of the winternitz one-time signature scheme. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 363\u2013378. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21969-6_23"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: IEEE Symposium on Security and Privacy (SP), pp. 315\u2013334. IEEE (2018)","DOI":"10.1109\/SP.2018.00020"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Derler, D., Ramacher, S., Slamanig, D.: Short double-and n-times-authentication-preventing signatures from ecdsa and more. In: IEEE European Symposium on Security and Privacy (EuroS &P), pp. 273\u2013287. IEEE (2018)","DOI":"10.1109\/EuroSP.2018.00027"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Ge, H., et al.: Koinonia: verifiable e-voting with long-term privacy. In: Proceedings of the 35th Annual Computer Security Applications Conference, pp. 270\u2013285 (2019)","DOI":"10.1145\/3359789.3359804"},{"issue":"2","key":"7_CR21","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"7_CR22","unstructured":"Green, M.: Ok Google: please publish your DKIM secret keys (2020). https:\/\/blog.cryptographyengineering.com\/2020\/11\/16\/ok-google-please-publish-your-dkim-secret-keys\/"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-662-46803-6_9","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"J Groth","year":"2015","unstructured":"Groth, J., Kohlweiss, M.: One-out-of-many proofs: or how to leak a secret and spend a coin. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 253\u2013280. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_9"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/3-540-68339-9_13","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201996","author":"M Jakobsson","year":"1996","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 143\u2013154. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68339-9_13"},{"key":"7_CR25","unstructured":"Karanikolas, N.: Digital signature legality in different jurisdictions: Legally binding issues (2019)"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-17373-8_11","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"A Kate","year":"2010","unstructured":"Kate, A., Zaverucha, G.M., Goldberg, I.: Constant-size commitments to polynomials and their applications. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 177\u2013194. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17373-8_11"},{"key":"7_CR27","unstructured":"Khovratovich, D., Maller, M., Tiwari, P.R.: Minroot: Candidate sequential function for ethereum vdf. Cryptology ePrint Archive (2022)"},{"key":"7_CR28","unstructured":"Lamport, L.: Constructing digital signatures from a one way function (1979)"},{"key":"7_CR29","unstructured":"Leurent, G., Mennink, B., Pietrzak, K., Rijmen, V.: Analysis of minroot: Public report (2023). https:\/\/crypto.ethereum.org\/events\/minrootanalysis2023.pdf"},{"key":"7_CR30","unstructured":"Lim, W.: Rln on kzg polynomial commitment scheme (2023). https:\/\/zkresear.ch\/t\/rln-on-kzg-polynomial-commitment-scheme-cross-posted\/114"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Mason, S.: Electronic signatures in law. University of London Press (2016)","DOI":"10.14296\/1116.9781911507017"},{"key":"7_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34805-0_21"},{"key":"7_CR33","unstructured":"Nikolaenko, V., Ragsdale, S., Bonneau, J., Boneh, D.: Powers-of-tau to the people: Decentralizing setup ceremonies. Cryptology ePrint Archive (2022)"},{"key":"7_CR34","unstructured":"Ottawa Citizen. Threats close stella luna gelato caf\u00e9 after owner\u2019s name appears in givesendgo data leak (2022). https:\/\/ottawacitizen.com\/news\/local-news\/threats-close-stella-luna-gelato-cafe-after-owners-name-appears-in-givesendgo-data-leak"},{"key":"7_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/978-3-319-11203-9_25","volume-title":"Computer Security - ESORICS 2014","author":"B Poettering","year":"2014","unstructured":"Poettering, B., Stebila, D.: Double-authentication-preventing signatures. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 436\u2013453. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11203-9_25"},{"key":"7_CR36","unstructured":"Privacy and Scaling Explorations team, Ethereum Foundation. Rate-limiting nullifier (2024). https:\/\/rate-limiting-nullifier.github.io\/rln-docs\/rln.html"},{"key":"7_CR37","unstructured":"Vac Research. Privacy-preserving p2p economic spam protection in waku v2 (2021). https:\/\/vac.dev\/rlog\/rln-relay\/"},{"key":"7_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"RL Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552\u2013565. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_32"},{"key":"7_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-540-25937-4_24","volume-title":"Fast Software Encryption","author":"P Rogaway","year":"2004","unstructured":"Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371\u2013388. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-25937-4_24"},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Ruffing, T., Kate, A., Schr\u00f6der, D.: Liar, liar, coins on fire! penalizing equivocation by loss of bitcoins. In: CCS 2015 (2015)","DOI":"10.1145\/2810103.2813686"},{"key":"7_CR41","unstructured":"Specter, M.A., Park, S., Green, M.: KeyForge:non-attributable email from Forward-Forgeable Signatures. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 1755\u20131773 (2021)"},{"key":"7_CR42","unstructured":"Wang, Z., et al.: DSKE: digital signatures with key extraction. Cryptology ePrint Archive, Paper 2022\/1753 (2022). https:\/\/eprint.iacr.org\/2022\/1753"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"Wesolowski, B.: Efficient verifiable delay functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques (2019)","DOI":"10.1007\/978-3-030-17659-4_13"},{"key":"7_CR44","unstructured":"Wicht, F.-X., Wang, Z., Le, D.V., Cachin, C.: A transaction-level model for blockchain privacy. Cryptology ePrint Archive (2023)"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-88661-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,5]],"date-time":"2025-04-05T17:41:58Z","timestamp":1743874918000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-88661-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031886607","9783031886614"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-88661-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"4 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CT-RSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cryptographers\u2019 Track at the RSA Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Francisco, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ctrsa2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ct-rsa-2025.csa.iisc.ac.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}