{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:04:14Z","timestamp":1771700654116,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319116976","type":"print"},{"value":"9783319116983","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11698-3_18","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T01:18:13Z","timestamp":1412817493000},"page":"233-245","source":"Crossref","is-referenced-by-count":2,"title":["Identity Based Threshold Ring Signature from Lattices"],"prefix":"10.1007","author":[{"given":"Baodian","family":"Wei","sequence":"first","affiliation":[]},{"given":"Yusong","family":"Du","sequence":"additional","affiliation":[]},{"given":"Huang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fangguo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Chongzhi","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-38616-9_3","volume-title":"Post-Quantum Cryptography","author":"S. Bettaieb","year":"2013","unstructured":"Bettaieb, S., Schrek, J.: Improved Lattice-Based Threshold Ring Signature Scheme. In: Gaborit, P. (ed.) PQCrypto 2013. LNCS, vol.\u00a07932, pp. 34\u201351. Springer, Heidelberg (2013)"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/3-540-45708-9_30","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"E. Bresson","year":"2002","unstructured":"Bresson, E., Stern, J., Szydlo, M.: Threshold Ring Signatures and Applications to Ad-hoc Groups. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 465\u2013480. Springer, Heidelberg (2002)"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology - EUROCRYPT \u201991","author":"D. Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol.\u00a0547, pp. 257\u2013265. Springer, Heidelberg (1991)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/11496618_17","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"S.S.M. Chow","year":"2005","unstructured":"Chow, S.S.M., Hui, L.C.K., Yiu, S.M.: Identity Based Threshold Ring Signature. In: Park, C.-S., Chee, S. (eds.) ICISC 2004. LNCS, vol.\u00a03506, pp. 218\u2013232. Springer, Heidelberg (2005)"},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-642-31662-3_4","volume-title":"Arithmetic of Finite Fields","author":"P.-L. Cayrel","year":"2012","unstructured":"Cayrel, P.-L., El Yousfi Alaoui, S.M., Hoffmann, G., V\u00e9ron, P.: An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes. In: \u00d6zbudak, F., Rodr\u00edguez-Henr\u00edquez, F. (eds.) WAIFI 2012. LNCS, vol.\u00a07369, pp. 45\u201363. Springer, Heidelberg (2012)"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-642-14712-8_16","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2010","author":"P.-L. Cayrel","year":"2010","unstructured":"Cayrel, P.-L., Lindner, R., R\u00fcckert, M., Silva, R.: A Lattice-Based Threshold Ring Signature Scheme. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol.\u00a06212, pp. 255\u2013272. Springer, Heidelberg (2010)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-19574-7_12","volume-title":"Selected Areas in Cryptography","author":"P.-L. Cayrel","year":"2011","unstructured":"Cayrel, P.-L., V\u00e9ron, P., El Yousfi Alaoui, S.M.: A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol.\u00a06544, pp. 171\u2013186. Springer, Heidelberg (2011)"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-10868-6_13","volume-title":"Cryptography and Coding","author":"L. Dallot","year":"2009","unstructured":"Dallot, L., Vergnaud, D.: Provably secure code-based threshold ring signatures. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol.\u00a05921, pp. 222\u2013235. Springer, Heidelberg (2009)"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-38348-9_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"S. Garg","year":"2013","unstructured":"Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol.\u00a07881, pp. 1\u201317. Springer, Heidelberg (2013)"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-540-24691-6_2","volume-title":"Information Security and Cryptology - ICISC 2003","author":"J.K. Liu","year":"2004","unstructured":"Liu, J.K., Wei, V.K., Wong, D.S.: A Separable Threshold Ring Signature Scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 352\u2013369. Springer, Heidelberg (2004)"},{"issue":"7","key":"18_CR11","doi-asserted-by":"publisher","first-page":"4833","DOI":"10.1109\/TIT.2011.2145950","volume":"57","author":"C.A. Melchor","year":"2011","unstructured":"Melchor, C.A., Cayrel, P.L., Gaborit, P., Laguillaumie, F.: A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. IEEE Transactions on Information Theory\u00a057(7), 4833\u20134842 (2011)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3-4","key":"18_CR12","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00200-013-0190-3","volume":"24","author":"A. Petzoldt","year":"2013","unstructured":"Petzoldt, A., Bulygin, S., Buchmann, J.: A multivariate based threshold ring signature scheme. Applicable Algebra in Engineering, Communication and Computing\u00a024(3-4), 255\u2013275 (2013)","journal-title":"Applicable Algebra in Engineering, Communication and Computing"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"R.L. Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 552\u2013565. Springer, Heidelberg (2001)"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1007\/978-3-642-22792-9_40","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"K. Sakumoto","year":"2011","unstructured":"Sakumoto, K., Shirai, T., Hiwatari, H.: Public-key identification schemes based on multivariate quadratic polynomials. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 706\u2013723. Springer, Heidelberg (2011)"},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1109\/SFCS.1994.365700","volume-title":"35th Annual Symposium on Foundations of Computer Science","author":"P. Shor","year":"1994","unstructured":"Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE Press, New York (1994)"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-540-30556-9_30","volume-title":"Progress in Cryptology - INDOCRYPT 2004","author":"P.P. Tsang","year":"2004","unstructured":"Tsang, P.P., Wei, V.K., Chan, T.K., Au, M.H., Liu, J.K., Wong, D.S.: Separable Linkable Threshold Ring Signatures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol.\u00a03348, pp. 384\u2013398. Springer, Heidelberg (2004)"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/ISME.2010.113","volume-title":"2010 International Conference of Information Science and Management Engineering","author":"H. Wang","year":"2010","unstructured":"Wang, H., Han, S.: A Provably Secure Threshold Ring Signature Scheme in Certificateless Cryptography. In: 2010 International Conference of Information Science and Management Engineering, vol.\u00a01, pp. 105\u2013108. IEEE Press, New York (2010)"},{"key":"18_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-642-25243-3_2","volume-title":"Information and Communications Security","author":"J. Wang","year":"2011","unstructured":"Wang, J., Sun, B.: Ring Signature Schemes from Lattice Basis Delegation. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol.\u00a07043, pp. 15\u201328. Springer, Heidelberg (2011)"},{"key":"18_CR19","unstructured":"Wei, V.K.: A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups. Cryptology ePrint Archive, \n                    \n                      http:\/\/eprint.iacr.org\/2004\/039"},{"key":"18_CR20","first-page":"478","volume-title":"6th International Conference on Communications, Circuits and Systems","author":"H. Xiong","year":"2008","unstructured":"Xiong, H., Qin, Z., Li, F., Jin, J.: Identity-based Threshold Ring Signature Without Pairings. In: 6th International Conference on Communications, Circuits and Systems, pp. 478\u2013482. IEEE Press, New York (2008)"},{"key":"18_CR21","first-page":"2646","volume-title":"International Conference on Systems, Man, and Cybernetics","author":"F. Xu","year":"2011","unstructured":"Xu, F., Lv, X.: A New Identity-Based Threshold Ring Signature Scheme. In: International Conference on Systems, Man, and Cybernetics, pp. 2646\u20132651. IEEE Press, New York (2011)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11698-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T01:49:03Z","timestamp":1548899343000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11698-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319116976","9783319116983"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11698-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}