{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T12:17:42Z","timestamp":1769861862620,"version":"3.49.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032155405","type":"print"},{"value":"9783032155412","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-15541-2_1","type":"book-chapter","created":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:07:39Z","timestamp":1769803659000},"page":"3-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["HAPPIER: Hash-Based, Aggregatable, Practical Post-quantum Signatures Implemented Efficiently with\u00a0Risc0"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-4900-9081","authenticated-orcid":false,"given":"Arda","family":"Saygan","sequence":"first","affiliation":[]},{"given":"Muhammed Said","family":"G\u00fcndo\u011fan","sequence":"additional","affiliation":[]},{"given":"Atakan","family":"Arslan","sequence":"additional","affiliation":[]},{"given":"Mehmet Emin","family":"G\u00f6nen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,31]]},"reference":[{"key":"1_CR1","unstructured":"Call for Proposals - Post-Quantum Cryptography $$|$$ CSRC. https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/post-quantum-cryptography-standardization\/Call-for-Proposals. Accessed 23 Jan 2024"},{"key":"1_CR2","unstructured":"Pragmatic signature aggregation with BLS \u2014 ethresear.ch. https:\/\/ethresear.ch\/t\/pragmatic-signature-aggregation-with-bls\/2105?u=benjaminion. Accessed 05 Mar 2025"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Aardal, M.A., Aranha, D.F., Boudgoust, K., Kolby, S., Takahashi, A.: Aggregating falcon signatures with labrador. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology - CRYPTO 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part I. Lecture Notes in Computer Science, vol. 14920, pp. 71\u2013106. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-68376-3_3","DOI":"10.1007\/978-3-031-68376-3_3"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-031-58751-1_1","volume-title":"Advances in Cryptology - EUROCRYPT 2024","author":"A Arun","year":"2024","unstructured":"Arun, A., Setty, S., Thaler, J.: Jolt: snarks for virtual machines via lookups. In: Joye, M., Leander, G. (eds.) Advances in Cryptology - EUROCRYPT 2024, pp. 3\u201333. Springer Nature Switzerland, Cham (2024)"},{"key":"1_CR5","unstructured":"Ben-Sasson, E., Bentov, I., Horesh, Y., Riabzev, M.: Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive, Paper 2018\/046 (2018). https:\/\/eprint.iacr.org\/2018\/046"},{"key":"1_CR6","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., H\u00fclsing, A., K\u00f6lbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS$$ ^{\\text{+}}$$ signature framework. In: Cavallaro, L., Kinder, J., Wang, X., Katz, J. (eds.) Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, pp. 2129\u20132146. ACM (2019). https:\/\/doi.org\/10.1145\/3319535.3363229","DOI":"10.1145\/3319535.3363229"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., Drijvers, M., Neven, G.: Compact multi-signatures for smaller blockchains. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 435\u2013464. Springer (2018)","DOI":"10.1007\/978-3-030-03329-3_15"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416\u2013432. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_26"},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17(4), 297\u2013319 (2004). https:\/\/doi.org\/10.1007\/S00145-004-0314-9","DOI":"10.1007\/S00145-004-0314-9"},{"key":"1_CR10","unstructured":"BTQ: Introducing PQScale - A scaling solution for post-quantum signatures. https:\/\/www.btq.com\/blog\/introducing-pqscale-a-scaling-solution-for-post-quantum-signatures. Accessed 26 Feb 2024"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-25405-5_8","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2011","unstructured":"Buchmann, J., Dahmen, E., H\u00fclsing, A.: XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.Y. (ed.) Post-Quantum Cryptography, pp. 117\u2013129. Springer, Berlin Heidelberg, Berlin, Heidelberg (2011)"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Drijvers, M., Hanke, T., Pignolet, Y.A., Shoup, V., Williams, D.: Internet computer consensus. In: Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing, pp. 81\u201391. PODC\u201922, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3519270.3538430","DOI":"10.1145\/3519270.3538430"},{"key":"1_CR13","unstructured":"Community, E.R.: Signature merging for large-scale consensus. https:\/\/ethresear.ch\/t\/signature-merging-for-large-scale-consensus\/17386 (2023). Accessed 17 Apr 2025"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Cooper, D.A., Apon, D.C., Dang, Q.H., Davidson, M.S., Dworkin, M.J., Miller, C.A.: Recommendation for stateful hash-based signature schemes (Oct 2020). https:\/\/doi.org\/10.6028\/NIST.SP.800-208. Accessed April 18 2025","DOI":"10.6028\/NIST.SP.800-208"},{"key":"1_CR15","doi-asserted-by":"publisher","unstructured":"Drake, J., Khovratovich, D., Kudinov, M., Wagner, B.: Hash-based multi-signatures for post-quantum ethereum. IACR Commun. Cryptol. 2(1) (2025). https:\/\/doi.org\/10.62056\/aey7qjp10","DOI":"10.62056\/aey7qjp10"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: Scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, October 28-31, 2017. pp. 51\u201368. ACM (2017). https:\/\/doi.org\/10.1145\/3132747.3132757, https:\/\/doi.org\/10.1145\/3132747.3132757","DOI":"10.1145\/3132747.3132757"},{"key":"1_CR17","unstructured":"Goldberg, L., Papini, S., Riabzev, M.: Cairo \u2013 a turing-complete STARK-friendly CPU architecture. Cryptology ePrint Archive, Paper 2021\/1063 (2021). https:\/\/eprint.iacr.org\/2021\/1063"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-662-49896-5_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2016","author":"J Groth","year":"2016","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 305\u2013326. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_11"},{"key":"1_CR19","unstructured":"Hsiang, J.H., Fu, S., Kuo, P.C., Cheng, C.M.: PQScale: a post-quantum signature aggregation algorithm. https:\/\/uploads-ssl.webflow.com\/642374103c1677f8f335c581\/64771752dbe6933ceb1d712b_PQScale.pdf (2023). online"},{"key":"1_CR20","doi-asserted-by":"publisher","unstructured":"Huelsing, A., Butin, D., Gazdag, S.L., Rijneveld, J., Mohaisen, A.: XMSS: eXtended Merkle Signature Scheme. RFC 8391 (May 2018). https:\/\/doi.org\/10.17487\/RFC8391, https:\/\/www.rfc-editor.org\/info\/rfc8391","DOI":"10.17487\/RFC8391"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Kadianakis, G., Zapico, A., Hafezi, H., B\u00fcnz, B.: KZH-fold: Accountable voting from sublinear accumulation. Cryptology ePrint Archive, Paper 2025\/144 (2025). https:\/\/eprint.iacr.org\/2025\/144","DOI":"10.1145\/3719027.3744796"},{"key":"1_CR22","doi-asserted-by":"publisher","unstructured":"Khaburzaniya, I., Chalkias, K., Lewi, K., Malvai, H.: Aggregating and thresholdizing hash-based signatures using starks. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pp. 393\u2013407. ASIA CCS \u201922, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3488932.3524128","DOI":"10.1145\/3488932.3524128"},{"key":"1_CR23","doi-asserted-by":"publisher","unstructured":"Liu, T., Zhang, Z., Zhang, Y., Hu, W., Zhang, Y.: Ceno: Non-uniform, segment and parallel zero-knowledge virtual machine. J. Cryptol. 38(2), 17 (2025). https:\/\/doi.org\/10.1007\/S00145-024-09533-2","DOI":"10.1007\/S00145-024-09533-2"},{"key":"1_CR24","unstructured":"Marin, D., Abdalla, M., Govereau, P., Groth, J., Judson, S., Sosnin, K., Vamsi, G.: Nexus 1.0: Enabling verifiable computation. https:\/\/nexus-xyz.github.io\/assets\/nexus_whitepaper.pdf (2024)"},{"key":"1_CR25","unstructured":"Matter Labs: zkSync protocol: zkSync virtual machine (zkvm). https:\/\/docs.zksync.io\/zksync-protocol\/vm (2024). Accessed Apr 18 2025"},{"key":"1_CR26","unstructured":"NIST: NIST Announces First Four Quantum-Resistant Cryptographic Algorithms \u2014 nist.gov. https:\/\/www.nist.gov\/news-events\/news\/2022\/07\/nist-announces-first-four-quantum-resistant-cryptographic-algorithms. Accessed 23 Feb 2024"},{"key":"1_CR27","unstructured":"Polygon Labs: Polygon zkEVM documentation. https:\/\/docs.polygon.technology\/zkEVM\/ (2024). Accessed Apr 18 2025"},{"key":"1_CR28","unstructured":"Prisyazhnyy, I.: merkle_light: Lightweight merkle tree implementation in rust. https:\/\/crates.io\/crates\/merkle_light (2023). Accessed 18 Apr 2024"},{"key":"1_CR29","unstructured":"RISC Zero: RISC zero proof system documentation. https:\/\/dev.risczero.com\/proof-system\/ (2024). Accessed 18 Apr 2024"},{"key":"1_CR30","unstructured":"RISC Zero: RISC zero proof system in detail. https:\/\/dev.risczero.com\/proof-system-in-detail.pdf (2024). Accessed 17 Apr 2025"},{"key":"1_CR31","unstructured":"Scroll Team: Scroll: A native zkEVM layer 2 solution for Ethereum. https:\/\/scroll.io\/files\/whitepaper.pdf (2023). Accessed Apr 18 2025"},{"key":"1_CR32","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Algorithms for quantum computation: Discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994, pp. 124\u2013134. IEEE Computer Society (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"1_CR33","unstructured":"Tomita, T., Shikata, J.: Compact aggregate signature from module-lattices. Cryptology ePrint Archive, Paper 2023\/471 (2023). https:\/\/eprint.iacr.org\/2023\/471"},{"key":"1_CR34","unstructured":"Wagner, B., Coratger, T., Khovratovich, D., Han: hash-sig: A rust library for hash-based signature schemes. https:\/\/github.com\/b-wagn\/hash-sig\/commit\/05fdfe5ee3cca789082d2c86556dba103dd67678 (2023), commit: 05fdfe5. Accessed 18 May 2024"},{"key":"1_CR35","unstructured":"Zcash Team: Zcash protocol specification. https:\/\/zips.z.cash\/protocol\/protocol.pdf (2024). Accessed 18 May 2025"},{"key":"1_CR36","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-031-68376-3_1","volume-title":"Advances in Cryptology - CRYPTO 2024","author":"X Zhang","year":"2024","unstructured":"Zhang, X., Steinfeld, R., Esgin, M.F., Liu, J.K., Liu, D., Ruj, S.: Loquat: a snark-friendly post-quantum signature based on the legendre prf with applications in ring and aggregate signatures. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology - CRYPTO 2024, pp. 3\u201338. Springer Nature Switzerland, Cham (2024)"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-15541-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:07:41Z","timestamp":1769803661000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-15541-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032155405","9783032155412"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-15541-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"31 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LightSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Lightweight Cryptography for Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"T\u00fcrkiye","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"lightsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.encrypt-on.com\/activities\/conferences\/lightsec-2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}