{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:39:29Z","timestamp":1759365569009,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032067531","type":"print"},{"value":"9783032067548","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06754-8_5","type":"book-chapter","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T08:24:13Z","timestamp":1759307053000},"page":"130-142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Great-LaKeys: An Improved Threshold-PRF and\u00a0a\u00a0Novel Exponent-VRF from\u00a0LWR"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Geihs","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,2]]},"reference":[{"issue":"3","key":"5_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.46586\/tosc.v2020.i3.1-45","volume":"2020","author":"A Aly","year":"2020","unstructured":"Aly, A., Ashur, T., Ben-Sasson, E., Dhooghe, S., Szepieniec, A.: Design of symmetric-key primitives for advanced cryptographic protocols. IACR Trans. Symmetric Cryptol. 2020(3), 1\u201345 (2020)","journal-title":"IACR Trans. Symmetric Cryptol."},{"key":"5_CR2","unstructured":"Albrecht, M.R.,\u00a0Davidson, A.,\u00a0Deo, A., Gardham, D.: Crypto dark matter on the torus: oblivious prfs from shallow prfs and fhe. Cryptology ePrint Archive, Paper 2023\/232, 2023. https:\/\/eprint.iacr.org\/2023\/232"},{"key":"5_CR3","unstructured":"B\u00fcnz, B.,\u00a0Bootle, J.,\u00a0Boneh, D.,\u00a0Poelstra, A.,\u00a0Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. Cryptology ePrint Archive, Paper 2017\/1066, 2017. https:\/\/eprint.iacr.org\/2017\/1066"},{"key":"5_CR4","unstructured":"Boneh, D., Haitner, I., Lindell, Y.: Exponent-VRFs and their applications. Cryptology ePrint Archive, Paper 2024\/397, 2024. https:\/\/eprint.iacr.org\/2024\/397"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Catrina, O., de Hoogh, S.: Improved primitives for secure multiparty integer computation. In: Garay, J.A., De Prisco, R. (eds.) Security and Cryptography for Networks. SCN 2010. LNCS, vol. 6280, pp. 182\u2013199. Springer, Berlin, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15317-4_13","DOI":"10.1007\/978-3-642-15317-4_13"},{"key":"5_CR6","unstructured":"Deo, A., Joye, M., Libert, B., Curtis, B.R., de\u00a0Bellabre, M.: Homomorphic evaluation of LWR-based PRFs and application to transciphering. Cryptology ePrint Archive, Paper 2024\/665, 2024. https:\/\/eprint.iacr.org\/2024\/665"},{"issue":"4","key":"5_CR7","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"34","author":"O Goldreich","year":"1986","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 34(4), 792\u2013807 (1986)","journal-title":"J. ACM"},{"key":"5_CR8","unstructured":"Geihs, M., Montgomery, H.: LaKey: efficient lattice-based distributed prfs enable scalable distributed key management. In: 33rd USENIX Security Symposium (USENIX Security 24), pp. 4319\u20134335, Philadelphia, PA, August 2024. USENIX Association"},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"Grassi, L., Oygarden, M., Schofnegger, M., Walch, R.: From farfalle to megafono via ciminion: the PRF Hydra for MPC applications. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2023. EUROCRYPT 2023. LNCS, vol. 14007, pp. 255\u2013286. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30634-1_9","DOI":"10.1007\/978-3-031-30634-1_9"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Hao, F.: Schnorr Non-interactive Zero-Knowledge Proof. RFC 8235, September 2017","DOI":"10.17487\/RFC8235"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Keller, M.: MP-SPDZ: a versatile framework for multi-party computation. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020","DOI":"10.1145\/3372297.3417872"},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (eds.) Advances in Cryptology \u2013 CRYPTO\u2019 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol. 435, pp. 239\u2013252. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34805-0_22","DOI":"10.1007\/0-387-34805-0_22"},{"issue":"3","key":"5_CR13","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1080\/10586458.2011.565253","volume":"20","author":"JH Silverman","year":"2011","unstructured":"Silverman, J.H., Stange, K.E.: Amicable pairs and aliquot cycles for elliptic curves. Exp. Math. 20(3), 329\u2013357 (2011)","journal-title":"Exp. Math."},{"key":"5_CR14","unstructured":"Zero-knowledge Cryptography in Rust. Bulletproofs, 2024. https:\/\/github.com\/zkcrypto\/bulletproofs"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 LATINCRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06754-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T08:24:19Z","timestamp":1759307059000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06754-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,2]]},"ISBN":["9783032067531","9783032067548"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06754-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,2]]},"assertion":[{"value":"2 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LATINCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Information Security in Latin America","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Medell\u00edn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"latincrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ciencias.medellin.unal.edu.co\/eventos\/latincrypt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}