{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:59:26Z","timestamp":1725893966411},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540729044"},{"type":"electronic","value":"9783540729051"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72905-1_9","type":"book-chapter","created":{"date-parts":[[2007,8,20]],"date-time":"2007-08-20T13:47:06Z","timestamp":1187617626000},"page":"95-106","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register"],"prefix":"10.1007","author":[{"given":"Xiangxue","family":"Li","sequence":"first","affiliation":[]},{"given":"Dong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman group signature scheme. In: Proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2003) Miami, FL, USA, pp. 31\u201346 ( 2003)","DOI":"10.1007\/3-540-36288-6_3"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg (2001)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y. Desmedt","year":"1990","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"issue":"4","key":"9_CR4","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1002\/ett.4460050407","volume":"5","author":"Y. Desmedt","year":"1994","unstructured":"Desmedt, Y.: Threshold cryptography. European Transactions on Telecommunications\u00a05(4), 449\u2013457 (1994)","journal-title":"European Transactions on Telecommunications"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/11423461_22","volume-title":"Sequences and Their Applications - SETA 2004","author":"K. Giuliani","year":"2005","unstructured":"Giuliani, K., Gong, G.: New LFSR-based cryptosystems and the trace discrete logrithm problem (Trace-DLP). In: Helleseth, T., Sarwate, D., Song, H.-Y., Yang, K. (eds.) SETA 2004. LNCS, vol.\u00a03486, pp. 298\u2013312. Springer, Heidelberg (2005)"},{"key":"9_CR6","unstructured":"Golomb, S.: Shift register sequences. Laguna Hills, CA, Aegean Park (1982)"},{"key":"9_CR7","first-page":"2601","volume":"24","author":"G. Gong","year":"1998","unstructured":"Gong, G., Harn, L.: Public-key cryptosystems based on cubic finite field extensions. IEEE Transaction on Information Theory\u00a024, 2601\u20132605 (1998)","journal-title":"IEEE Transaction on Information Theory"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44598-6_1","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"A. Lenstra","year":"2000","unstructured":"Lenstra, A., Verheul, E.: The XTR public key system. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 1\u201319. Springer, Heidelberg (2000)"},{"issue":"3","key":"9_CR9","first-page":"266","volume":"4","author":"X. Li","year":"2007","unstructured":"Li, X., Zheng, D., Chen, K.: LFSR-based signatures with message recovery. Intenational Journal of Network Security\u00a04(3), 266\u2013270 (2007)","journal-title":"Intenational Journal of Network Security"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b98796","volume-title":"Information Security and Privacy","author":"J. Liu","year":"2004","unstructured":"Liu, J., Wei, V., Wong, D.: Linkable spontaneous anonymous group signature for ad hoc groups. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, Springer, Heidelberg (2004)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Liu, J., Wong, D.: Linkable Ring Signatures: Security Models and New Schemes. In: Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005), Singapore, pp. 614\u2013623 (2005)","DOI":"10.1007\/11424826_65"},{"key":"9_CR12","unstructured":"Niederreiter, H.: Finite Fields and cryptology. Finite Fields, Coding Theory, and Advances in Communications and Computing, pp. 359\u2013373, M. Dekker, New York (1993)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/BFb0055741","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"K. Ohta","year":"1998","unstructured":"Ohta, K., Okamoto, T.: On concrete security treatment of signatures derived from identification. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 354\u2013369. Springer, Heidelberg (1998)"},{"issue":"3","key":"9_CR14","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D. Pointcheval","year":"2000","unstructured":"Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. Journal of Cryptology\u00a013(3), 361\u2013396 (2000)","journal-title":"Journal of Cryptology"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"R. Rivest","year":"2001","unstructured":"Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, Springer, Heidelberg (2001)"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0000447","volume-title":"Advances in Cryptology - ASIACRYPT \u201994","author":"P. Smith","year":"1995","unstructured":"Smith, P., Skinner, C.: A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol.\u00a0917, Springer, Heidelberg (1995)"},{"key":"9_CR17","first-page":"1213","volume":"E86-A","author":"C. Tan","year":"2003","unstructured":"Tan, C., Yi, X., Siew, C.: On the n-th order shift register based discrete logrithm. IEICE Trans. Fundamentals\u00a0E86-A, 1213\u20131216 (2003)","journal-title":"IEICE Trans. Fundamentals"},{"key":"9_CR18","unstructured":"Wei, V.: A bilinear spontaneous anonymous threshold signature for ad hoc groups. Cryptology ePrint Archive, Report 2004\/039, available at: \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/3-540-36178-2_33","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"F. Zhang","year":"2002","unstructured":"Zhang, F., Kim, K.: ID-Based blind signature and ring signature from pairings. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 415\u2013432. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72905-1_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:50:38Z","timestamp":1619502638000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72905-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540729044","9783540729051"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72905-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}