{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T13:30:50Z","timestamp":1772199050737,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":58,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819529605","type":"print"},{"value":"9789819529612","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T00:00:00Z","timestamp":1760054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2961-2_1","type":"book-chapter","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T14:01:54Z","timestamp":1760364114000},"page":"3-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Many-Time Linkable Ring Signatures"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-3452-9787","authenticated-orcid":false,"given":"Nam","family":"Tran","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8555-638X","authenticated-orcid":false,"given":"Khoa","family":"Nguyen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0221-2571","authenticated-orcid":false,"given":"Dongxi","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1917-6466","authenticated-orcid":false,"given":"Josef","family":"Pieprzyk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1562-5105","authenticated-orcid":false,"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,10]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","unstructured":"Abe, M., Ohkubo, M., Suzuki, K.: 1-out-of-n Signatures from a Variety of Keys. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 415\u2013432. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-36178-2_26","DOI":"10.1007\/3-540-36178-2_26"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Ajtai, M.: Generating hard instances of lattice problems (extended abstract). In Gary\u00a0L. Miller, (ed) STOC 1996, pp. 99\u2013108. ACM (1996)","DOI":"10.1145\/237814.237838"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Backes, M., D\u00f6ttling, N., Hanzlik, L., Kluczniak, K., Schneider, J.: Ring signatures: Logarithmic-size, no setup - from standard assumptions. In: EUROCRYPT 2019 of LNCS, vol. 11478, pp. 281\u2013311. Springer (2019)","DOI":"10.1007\/978-3-030-17659-4_10"},{"key":"1_CR4","doi-asserted-by":"publisher","unstructured":"Baum, C., Damg\u00e5rd, I., Lyubashevsky, V., Oechsner, S., Peikert, C.: More efficient commitments from structured lattice assumptions. In: Catalano, D., De Prisco, R. (eds.) SCN 2018. LNCS, vol. 11035, pp. 368\u2013385. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98113-0_20","DOI":"10.1007\/978-3-319-98113-0_20"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Baum, C., Lin, H., Oechsner, S.: Towards practical lattice-based one-time linkable ring signatures. In: Naccache, D., et\u00a0al. (eds.) ICICS 2018. LNCS, vol. 11149, pp. 303\u2013322. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01950-1_18","DOI":"10.1007\/978-3-030-01950-1_18"},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s00145-007-9011-9","volume":"22","author":"A Bender","year":"2009","unstructured":"Bender, A., Katz, J., Morselli, R.: Ring signatures: stronger definitions, and constructions without random oracles. J. Cryptol. 22(1), 114\u2013138 (2009)","journal-title":"J. Cryptol."},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Beullens, W., Katsumata, S., Pintore, F.: Calamari and Falafl: logarithmic (Linkable) ring signatures from isogenies and lattices. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12492, pp. 464\u2013492. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64834-3_16","DOI":"10.1007\/978-3-030-64834-3_16"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416\u2013432. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_26","DOI":"10.1007\/3-540-39200-9_26"},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Boneh, D., Lewi, K., Montgomery, H., Raghunathan, A.: Key homomorphic PRFs and their applications. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 410\u2013428. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_23","DOI":"10.1007\/978-3-642-40041-4_23"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: CCS 2004, pp. 168\u2013177. ACM (2004)","DOI":"10.1145\/1030083.1030106"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Bootle, J., Elkhiyaoui, K., Hesse, J., Manevich, Y.: DualDory: logarithmic-verifier linkable ring signatures through preprocessing. In: ESORICS 2022 of LNCS, vol. 13555, pp. 427\u2013446. Springer (2022)","DOI":"10.1007\/978-3-031-17146-8_21"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Boyen, X., Haines, T.: Forward-secure linkable ring signatures. In: Susilo, W., Yang, G. (eds.) ACISP 2018. LNCS, vol. 10946, pp. 245\u2013264. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93638-3_15","DOI":"10.1007\/978-3-319-93638-3_15"},{"key":"1_CR13","doi-asserted-by":"publisher","unstructured":"Branco, P., Mateus, P.: A code-based linkable ring signature scheme. In: Baek, J., Susilo, W., Kim, J. (eds.) ProvSec 2018. LNCS, vol. 11192, pp. 203\u2013219. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01446-9_12","DOI":"10.1007\/978-3-030-01446-9_12"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures and applications to ad-hoc groups. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 465\u2013480. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45708-9_30","DOI":"10.1007\/3-540-45708-9_30"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Bultel, X., Olivier-Anclin, C.: On the anonymity of linkable ring signatures. In: CANS 2024 of LNCS, vol. 14905, pages 212\u2013235. Springer (2024)","DOI":"10.1007\/978-981-97-8013-6_10"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Hohenberger, S., Kohlweiss, M., Lysyanskaya, A., Meyerovich, M.: How to win the clonewars: efficient periodic n-times anonymous authentication. In: ACM CCS 2010, pp. 201\u2013210. ACM (2006)","DOI":"10.1145\/1180405.1180431"},{"key":"1_CR17","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 302\u2013321. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_18","DOI":"10.1007\/11426639_18"},{"key":"1_CR18","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Balancing accountability and privacy using e-cash (extended abstract). In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 141\u2013155. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11832072_10","DOI":"10.1007\/11832072_10"},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93\u2013118. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44987-6_7","DOI":"10.1007\/3-540-44987-6_7"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: CRYPTO \u201988, vol. 403, pp. 319\u2013327. Springer (1988)","DOI":"10.1007\/0-387-34799-2_25"},{"key":"1_CR21","doi-asserted-by":"publisher","unstructured":"Chaum, D., Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257\u2013265. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-46416-6_22","DOI":"10.1007\/3-540-46416-6_22"},{"key":"1_CR22","unstructured":"Sherman S.M., Chow, J.K.L., Wong, D.S.: Robust receipt-free election system with ballot secrecy and verifiability. In: NDSS 2008. The Internet Society (2008)"},{"key":"1_CR23","doi-asserted-by":"publisher","unstructured":"Damg\u00e5rd, I., Dupont, K., Pedersen, M.\u00d8.: Unclonable group identification. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 555\u2013572. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_33","DOI":"10.1007\/11761679_33"},{"key":"1_CR24","doi-asserted-by":"publisher","unstructured":"Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_24","DOI":"10.1007\/3-540-45748-8_24"},{"key":"1_CR25","doi-asserted-by":"publisher","unstructured":"Esgin, M.F., Steinfeld, R., Sakzad, A., Liu, J.K., Liu, D.: Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures. In: Deng, R.H., Gauthier-Uma\u00f1a, V., Ochoa, M., Yung, M. (eds.) ACNS 2019. LNCS, vol. 11464, pp. 67\u201388. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21568-2_4","DOI":"10.1007\/978-3-030-21568-2_4"},{"key":"1_CR26","doi-asserted-by":"publisher","unstructured":"Feng, H., Liu, J., Wu, Q.: Secure stern signatures in quantum random oracle model. In: Lin, Z., Papamanthou, C., Polychronakis, M. (eds.) ISC 2019. LNCS, vol. 11723, pp. 425\u2013444. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30215-3_21","DOI":"10.1007\/978-3-030-30215-3_21"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: CRYPTO 1986 of LNCS, vol. 263, pp. 186\u2013194. Springer 1986","DOI":"10.1007\/3-540-47721-7_12"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Fiore, D., Garms, L., Kolonelos, D., Soriente, C., Tucker, I.: Ring signatures with user-controlled linkability. In ESORICS 2022 of LNCS, vol. 13555, pp. 405\u2013426. Springer (2022)","DOI":"10.1007\/978-3-031-17146-8_20"},{"key":"1_CR29","doi-asserted-by":"publisher","unstructured":"Fujisaki, E., Suzuki, K.: Traceable ring signature. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 181\u2013200. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-71677-8_13","DOI":"10.1007\/978-3-540-71677-8_13"},{"issue":"2","key":"1_CR30","doi-asserted-by":"publisher","first-page":"304","DOI":"10.2478\/popets-2022-0047","volume":"2022","author":"A Goel","year":"2022","unstructured":"Goel, A., Green, M., Hall-Andersen, M., Kaptchuk, G.: Efficient set membership proofs using mpc-in-the-head. Proc. Priv. Enhancing Technol. 2022(2), 304\u2013324 (2022)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"1_CR31","doi-asserted-by":"publisher","unstructured":"Kawachi, A., Tanaka, K., Xagawa, K.: Concurrently secure identification schemes based on the worst-case hardness of lattice problems. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 372\u2013389. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-89255-7_23","DOI":"10.1007\/978-3-540-89255-7_23"},{"issue":"2","key":"1_CR32","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1515\/popets-2015-0012","volume":"2015","author":"M Kohlweiss","year":"2015","unstructured":"Kohlweiss, M., Miers, I.: Accountable metadata-hiding escrow: a group signature case study. Proc. Priv. Enhancing Technol. 2015(2), 206\u2013221 (2015)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"1_CR33","doi-asserted-by":"publisher","unstructured":"Libert, B., Ling, S., Nguyen, K., Wang, H.: Zero-Knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 1\u201331. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_1","DOI":"10.1007\/978-3-662-49896-5_1"},{"key":"1_CR34","doi-asserted-by":"publisher","unstructured":"Libert, B., Nguyen, K., Peters, T., Yung, M.: Bifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing scheme. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12698, pp. 521\u2013552. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77883-5_18","DOI":"10.1007\/978-3-030-77883-5_18"},{"key":"1_CR35","doi-asserted-by":"publisher","unstructured":"Liu, J.K., Wei, V.K., Wong, D.S.: Linkable spontaneous anonymous group signature for ad hoc groups. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 325\u2013335. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-27800-9_28","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"1_CR36","doi-asserted-by":"publisher","unstructured":"Liu, Z., Nguyen, K., Yang, G., Wang, H., Wong, D.S.: A lattice-based linkable ring signature supporting stealth addresses. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11735, pp. 726\u2013746. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29959-0_35","DOI":"10.1007\/978-3-030-29959-0_35"},{"key":"1_CR37","doi-asserted-by":"publisher","unstructured":"Lu, X., Au, M.H., Zhang, Z.: Raptor: a practical lattice-based (linkable) ring signature. In: Deng, R.H., Gauthier-Uma\u00f1a, V., Ochoa, M., Yung, M. (eds.) ACNS 2019. LNCS, vol. 11464, pp. 110\u2013130. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21568-2_6","DOI":"10.1007\/978-3-030-21568-2_6"},{"key":"1_CR38","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V., Nguyen, N.N.: BLOOM: bimodal lattice one-out-of-many proofs and applications. In ASIACRYPT 2022 of LNCS, vol. 13794, pp. 95\u2013125. Springer (2022)","DOI":"10.1007\/978-3-031-22972-5_4"},{"key":"1_CR39","doi-asserted-by":"publisher","unstructured":"Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-Based Signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376\u2013392. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19074-2_24","DOI":"10.1007\/978-3-642-19074-2_24"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Nguyen, K., Guo, F., Susilo, W., Yang, G.: Multimodal private signatures. In CRYPTO 2022 of LNCS, vol. 13508, pp. 792\u2013822. Springer (2022)","DOI":"10.1007\/978-3-031-15979-4_27"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Nguyen, K., Roy, S.P., Susilo, W., Xu, Y.: Bicameral and auditably private signatures. In ASIACRYPT 2023 of LNCS, vol. 14439, pp. 313\u2013347. Springer (2023)","DOI":"10.1007\/978-981-99-8724-5_10"},{"key":"1_CR42","unstructured":"Noether, S.: Ring signature confidential transactions for Monero. IACR Cryptol. ePrint Arch., 1098 (2015)"},{"key":"1_CR43","doi-asserted-by":"publisher","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552\u2013565. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_32","DOI":"10.1007\/3-540-45682-1_32"},{"key":"1_CR44","doi-asserted-by":"crossref","unstructured":"Sakai, Y., et al.: Group signatures with message-dependent opening. In: Pairing-Based Cryptography 2012 of LNCS vol. 7708, pp. 270\u2013294. Springer (2012)","DOI":"10.1007\/978-3-642-36334-4_18"},{"key":"1_CR45","doi-asserted-by":"publisher","unstructured":"Shacham, H., Waters, B.: Efficient Ring Signatures Without Random Oracles. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 166\u2013180. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-71677-8_12","DOI":"10.1007\/978-3-540-71677-8_12"},{"issue":"6","key":"1_CR46","doi-asserted-by":"publisher","first-page":"1757","DOI":"10.1109\/18.556672","volume":"42","author":"J Stern","year":"1996","unstructured":"Stern, J.: A new paradigm for public key identification. IEEE Trans. Inf. Theory 42(6), 1757\u20131768 (1996)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1_CR47","doi-asserted-by":"publisher","unstructured":"Sun, S.F., Au, M.H., Liu, J.K., Yuen, T.H.: RingCT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 456\u2013474. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66399-9_25","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"1_CR48","doi-asserted-by":"publisher","unstructured":"Teranishi, I., Furukawa, J., Sako, K.: k-Times anonymous authentication (extended abstract). In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 308\u2013322. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30539-2_22","DOI":"10.1007\/978-3-540-30539-2_22"},{"key":"1_CR49","doi-asserted-by":"crossref","unstructured":"Tran, N., Nguyen, K., Liu, D., Pieprzyk, J., Susilo, W.: Improved multimodal private signatures from lattices. In ACISP 2024 of LNCS, vol. 14896, pp. 3\u201323. Springer (2024)","DOI":"10.1007\/978-981-97-5028-3_1"},{"key":"1_CR50","doi-asserted-by":"publisher","unstructured":"Tsang, P.P., et al.: Separable linkable threshold ring signatures. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 384\u2013398. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30556-9_30","DOI":"10.1007\/978-3-540-30556-9_30"},{"key":"1_CR51","doi-asserted-by":"publisher","unstructured":"Unruh, D.: Non-interactive zero-knowledge proofs in the quantum random oracle model. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 755\u2013784. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_25","DOI":"10.1007\/978-3-662-46803-6_25"},{"key":"1_CR52","doi-asserted-by":"publisher","unstructured":"Xu, S., Yung, M.: Accountable ring signatures: a smart card approach. In: Quisquater, J.-J., Paradinas, P., Deswarte, Y., El Kalam, A.A. (eds.) CARDIS 2004. IIFIP, vol. 153, pp. 271\u2013286. Springer, Boston, MA (2004). https:\/\/doi.org\/10.1007\/1-4020-8147-2_18","DOI":"10.1007\/1-4020-8147-2_18"},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"Xue, Y., Lu, X., Au, H.M., Zhang, C.: Efficient linkable ring signatures: new framework and post-quantum instantiations. In: ESORICS 2024 of LNCS, vol. 14985, pp. 435\u2013456. Springer (2024)","DOI":"10.1007\/978-3-031-70903-6_22"},{"key":"1_CR54","doi-asserted-by":"publisher","unstructured":"Yang, R., et al.: Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11692, pp. 147\u2013175. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26948-7_6","DOI":"10.1007\/978-3-030-26948-7_6"},{"key":"1_CR55","doi-asserted-by":"crossref","unstructured":"Yuen, T.H., Liu, J.K., Au, M.H., Susilo, W., Zhou, J.: Efficient linkable and\/or threshold ring signature without random oracles. Comput. J. 56(4), 407\u2013421 (2013)","DOI":"10.1093\/comjnl\/bxs115"},{"key":"1_CR56","doi-asserted-by":"publisher","unstructured":"Yuen, T.H., et al.: RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 464\u2013483. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_25","DOI":"10.1007\/978-3-030-51280-4_25"},{"key":"1_CR57","doi-asserted-by":"publisher","unstructured":"Zhandry, M.: Secure identity-based encryption in the quantum random oracle model. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 758\u2013775. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_44","DOI":"10.1007\/978-3-642-32009-5_44"},{"key":"1_CR58","doi-asserted-by":"crossref","unstructured":"Zhang, X., Liu, J.K., Steinfeld, R., Kuchta, V., Yu, J.: Revocable and linkable ring signature. In Inscrypt 2019 of LNCS, vol. 12020, pp. 3\u201327. Springer (2019)","DOI":"10.1007\/978-3-030-42921-8_1"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2961-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T12:47:49Z","timestamp":1772196469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2961-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,10]]},"ISBN":["9789819529605","9789819529612"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2961-2_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,10]]},"assertion":[{"value":"10 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yokohama","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sulab-sever.u-aizu.ac.jp\/provsec2025\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}