{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T12:58:30Z","timestamp":1772283510631,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540770893","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77090-9_66","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T17:19:26Z","timestamp":1196097566000},"page":"716-727","source":"Crossref","is-referenced-by-count":10,"title":["Linkable Ring Signatures from Linear Feedback Shift Register"],"prefix":"10.1007","author":[{"given":"Dong","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Xiangxue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kefei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"66_CR1","doi-asserted-by":"crossref","unstructured":"Abe, M., Ohkubo, M., Suzuki, K.: 1-out-of-n signatures from a variety of keys. In: Advances in Cryptology-Asiacrypt 2002, pp. 415\u2013432 (2002)","DOI":"10.1007\/3-540-36178-2_26"},{"key":"66_CR2","unstructured":"Camenisch, J., Stadler, M.: Proof systems for general systems of discrete logarithms. ETH Technical Report No, 260 (1997), ftp:\/\/ftp.inf.ethz.ch\/pub\/publications\/tech-reports\/"},{"key":"66_CR3","doi-asserted-by":"crossref","unstructured":"Giuliani, K., Gong, G.: New LFSR-Based cryptosystems and the trace discrete log problem (Trace-DLP). In: Proceedings of sequences and their applications-SETA 2004, pp. 298\u2013312 (2004)","DOI":"10.1007\/11423461_22"},{"key":"66_CR4","unstructured":"Golomb, S.: Shift register sequences. Laguna Hills, CA: Aegean Park (1982)"},{"key":"66_CR5","doi-asserted-by":"publisher","first-page":"2601","DOI":"10.1109\/18.796413","volume":"24","author":"G. Gong","year":"1999","unstructured":"Gong, G., Harn, L.: Public-key cryptosystems based on cubic finite field extensions. IEEE Transaction on Information Theory\u00a024, 2601\u20132605 (1999)","journal-title":"IEEE Transaction on Information Theory"},{"key":"66_CR6","unstructured":"Koblitz, N., Menezes, A.: Another look at generic group. Cryptology ePrint Archive, 2006\/230, http:\/\/eprint.iacr.org\/2006\/230"},{"key":"66_CR7","doi-asserted-by":"crossref","unstructured":"Lenstra, A., Verheul, E.: The XTR public key system. In: Advances in Cryptology-Crypto 2000, pp. 1\u201319 (2000)","DOI":"10.1007\/3-540-44598-6_1"},{"issue":"3","key":"66_CR8","first-page":"266","volume":"4","author":"X. Li","year":"2007","unstructured":"Li, X., Zheng, D., Chen, K.: LFSR-based signatures with message recovery. Intenational Journal of Network Security\u00a04(3), 266\u2013270 (2007)","journal-title":"Intenational Journal of Network Security"},{"key":"66_CR9","unstructured":"Lipmaa, H.: Proofs of knowledge of certain problems, http:\/\/www.cs.ut.ee\/lipmaa\/crypto\/link\/zeroknowledge\/pok.php"},{"key":"66_CR10","doi-asserted-by":"crossref","unstructured":"Liu, J., Wei, V., Wong, D.: Linkable spontaneous anonymous group signature for ad hoc groups. In: Proceedings of Australasian Conf. Information Security and Privacy-ACISP 2004, pp. 325\u2013335 (2004)","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"66_CR11","unstructured":"Niederreiter, H.: Finite fields and cryptology. In: Proceedings of Finite fields,coding theory, and Advances in communications and computing, Dekker, New York, pp. 359\u2013373 (1992)"},{"key":"66_CR12","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret. In: Advances in Cryptology-Asiacrypt 2001, pp. 552\u2013565 (2001)","DOI":"10.1007\/3-540-45682-1_32"},{"key":"66_CR13","doi-asserted-by":"crossref","unstructured":"Smith, P., Skinner, C.: A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms. In: Advances in Cryptology-Asiacrypt 1994, pp. 357\u2013364 (1994)","DOI":"10.1007\/BFb0000447"},{"issue":"5","key":"66_CR14","first-page":"1213","volume":"E86-A","author":"C. Tan","year":"2003","unstructured":"Tan, C., Yi, X., Siew, C.: On the n-th order shift register based discrete logarithm. IEICE Transaction on Fundamentals\u00a0E86-A(5), 1213\u20131216 (2003)","journal-title":"IEICE Transaction on Fundamentals"},{"key":"66_CR15","unstructured":"Wei, V.: A bilinear spontaneous anonymous threshold signature for ad hoc groups. Cryptology ePrint Archive, 2004\/039, http:\/\/eprint.iacr.org\/"},{"key":"66_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, F., Kim, K.: ID-Based blind signature and ring signature from pairings. In: Advances in Cryptology-Asiacrypt 2002, pp. 535\u2013547 (2002)","DOI":"10.1007\/3-540-36178-2_33"},{"key":"66_CR17","doi-asserted-by":"crossref","unstructured":"Zheng, D., Wei, V., Chen, K.: GDH group-based signature scheme with linkability. Communications, IEE Proceedings\u00a0153(5), 639\u2013644","DOI":"10.1049\/ip-com:20050167"}],"container-title":["Lecture Notes in Computer Science","Emerging Directions in Embedded and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77090-9_66.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:58:53Z","timestamp":1619521133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77090-9_66"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770893"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77090-9_66","relation":{},"subject":[]}}