{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:51:58Z","timestamp":1749271918032,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":33,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608874"},{"type":"electronic","value":"9789819608881"}],"license":[{"start":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:00:00Z","timestamp":1733875200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:00:00Z","timestamp":1733875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0888-1_10","type":"book-chapter","created":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T09:09:36Z","timestamp":1733821776000},"page":"296-325","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Delegatable Anonymous Credentials from Mercurial Signatures with Stronger Privacy"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6016-5163","authenticated-orcid":false,"given":"Scott","family":"Griffy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3567-3550","authenticated-orcid":false,"given":"Anna","family":"Lysyanskaya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1691-5291","authenticated-orcid":false,"given":"Omid","family":"Mir","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3377-9802","authenticated-orcid":false,"given":"Octavio","family":"Perez Kempner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4181-2561","authenticated-orcid":false,"given":"Daniel","family":"Slamanig","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,11]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","unstructured":"Acar, T., Nguyen, L.: Revocation for delegatable anonymous credentials. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC\u00a02011. LNCS, vol.\u00a06571, pp. 423\u2013440. Springer, Berlin, Heidelberg (Mar 2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_26","DOI":"10.1007\/978-3-642-19379-8_26"},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO\u00a02009. LNCS, vol.\u00a05677, pp. 108\u2013125. Springer, Berlin, Heidelberg (Aug 2009).https:\/\/doi.org\/10.1007\/978-3-642-03356-8_7","DOI":"10.1007\/978-3-642-03356-8_7"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Ben-Sasson, E., Chiesa, A., Green, M., Tromer, E., Virza, M.: Secure sampling of public parameters for succinct zero knowledge proofs. In: 2015 IEEE Symposium on Security and Privacy. pp. 287\u2013304. IEEE Computer Society Press (May 2015).https:\/\/doi.org\/10.1109\/SP.2015.25","DOI":"10.1109\/SP.2015.25"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Bl\u00f6mer, J., Bobolz, J.: Delegatable attribute-based anonymous credentials from dynamically malleable signatures. In: Preneel, B., Vercauteren, F. (eds.) ACNS 18International Conference on Applied Cryptography and Network Security. LNCS, vol. 10892, pp. 221\u2013239. Springer, Cham (Jul 2018). https:\/\/doi.org\/10.1007\/978-3-319-93387-0_12","DOI":"10.1007\/978-3-319-93387-0_12"},{"key":"10_CR5","doi-asserted-by":"publisher","unstructured":"Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: Atluri, V., Pfitzmann, B., McDaniel, P. (eds.) ACM CCS 2004. pp. 168\u2013177. ACM Press (Oct 2004).https:\/\/doi.org\/10.1145\/1030083.1030106","DOI":"10.1145\/1030083.1030106"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Bowe, S., Gabizon, A., Green, M.D.: A multi-party protocol for constructing the public parameters of the pinocchio zk-SNARK. In: Zohar, A., Eyal, I., Teague, V., Clark, J., Bracciali, A., Pintore, F., Sala, M. (eds.) FC 2018 Workshops. LNCS, vol. 10958, pp. 64\u201377. Springer, Berlin, Heidelberg (Mar 2019). https:\/\/doi.org\/10.1007\/978-3-662-58820-8_5","DOI":"10.1007\/978-3-662-58820-8_5"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Brorsson, J., David, B., Gentile, L., Pagnin, E., Wagner, P.S.: PAPR: Publicly auditable privacy revocation for anonymous credentials. In: Rosulek, M. (ed.) CT-RSA\u00a02023. LNCS, vol. 13871, pp. 163\u2013190. Springer, Cham (Apr 2023).https:\/\/doi.org\/10.1007\/978-3-031-30872-7_7","DOI":"10.1007\/978-3-031-30872-7_7"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Drijvers, M., Dubovitskaya, M.: Practical UC-secure delegatable credentials with attributes and their application to blockchain. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017. pp. 683\u2013699. ACM Press (Oct\u00a0\/\u00a0Nov 2017).https:\/\/doi.org\/10.1145\/3133956.3134025","DOI":"10.1145\/3133956.3134025"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Kohlweiss, M., Soriente, C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: Jarecki, S., Tsudik, G. (eds.) PKC\u00a02009. LNCS, vol.\u00a05443, pp. 481\u2013500. Springer, Berlin, Heidelberg (Mar 2009). https:\/\/doi.org\/10.1007\/978-3-642-00468-1_27","DOI":"10.1007\/978-3-642-00468-1_27"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Kohlweiss, M., Soriente, C.: Solving revocation with efficient update of anonymous credentials. In: Garay, J.A., Prisco, R.D. (eds.) SCN 10. LNCS, vol.\u00a06280, pp. 454\u2013471. Springer, Berlin, Heidelberg (Sep 2010). https:\/\/doi.org\/10.1007\/978-3-642-15317-4_28","DOI":"10.1007\/978-3-642-15317-4_28"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G.L., Neven, G., Pedersen, M.\u00d8.: Formal treatment of privacy-enhancing credential systems. In: Dunkelman, O., Keliher, L. (eds.) SAC 2015. LNCS, vol.\u00a09566, pp. 3\u201324. Springer, Cham (Aug 2016).https:\/\/doi.org\/10.1007\/978-3-319-31301-6_1","DOI":"10.1007\/978-3-319-31301-6_1"},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT\u00a02001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Berlin, Heidelberg (May 2001).https:\/\/doi.org\/10.1007\/3-540-44987-6_7","DOI":"10.1007\/3-540-44987-6_7"},{"key":"10_CR13","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) CRYPTO\u00a02002. LNCS, vol.\u00a02442, pp. 61\u201376. Springer, Berlin, Heidelberg (Aug 2002).https:\/\/doi.org\/10.1007\/3-540-45708-9_5","DOI":"10.1007\/3-540-45708-9_5"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Chase, M., Lysyanskaya, A.: On signatures of knowledge. In: Dwork, C. (ed.) CRYPTO\u00a02006. LNCS, vol.\u00a04117, pp. 78\u201396. Springer, Berlin, Heidelberg (Aug 2006).https:\/\/doi.org\/10.1007\/11818175_5","DOI":"10.1007\/11818175_5"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030\u20131044 (oct 1985). https:\/\/doi.org\/10.1145\/4372.4373","DOI":"10.1145\/4372.4373"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Connolly, A., Lafourcade, P., Perez-Kempner, O.: Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes. In: Hanaoka, G., Shikata, J., Watanabe, Y. (eds.) PKC\u00a02022, Part\u00a0I. LNCS, vol. 13177, pp. 409\u2013438. Springer, Cham (Mar 2022). https:\/\/doi.org\/10.1007\/978-3-030-97121-2_15","DOI":"10.1007\/978-3-030-97121-2_15"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Crites, E.C., Lysyanskaya, A.: Delegatable anonymous credentials from mercurial signatures. In: Matsui, M. (ed.) CT-RSA\u00a02019. LNCS, vol. 11405, pp. 535\u2013555. Springer, Cham (Mar 2019).https:\/\/doi.org\/10.1007\/978-3-030-12612-4_27","DOI":"10.1007\/978-3-030-12612-4_27"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Crites, E.C., Lysyanskaya, A.: Mercurial signatures for variable-length messages. PoPETs 2021(4), 441\u2013463 (2021). https:\/\/doi.org\/10.2478\/popets-2021-0079","DOI":"10.2478\/popets-2021-0079"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"Derler, D., Hanser, C., Slamanig, D.: A new approach to efficient revocable attribute-based anonymous credentials. In: Groth, J. (ed.) 15th IMA International Conference on Cryptography and Coding. LNCS, vol.\u00a09496, pp. 57\u201374. Springer, Cham (Dec 2015). https:\/\/doi.org\/10.1007\/978-3-319-27239-9_4","DOI":"10.1007\/978-3-319-27239-9_4"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Fuchsbauer, G., Hanser, C., Slamanig, D.: Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. Journal of Cryptology 32(2), 498\u2013546 (Apr 2019). https:\/\/doi.org\/10.1007\/s00145-018-9281-4","DOI":"10.1007\/s00145-018-9281-4"},{"key":"10_CR21","doi-asserted-by":"publisher","unstructured":"Griffy, S., Lysyanskaya, A.: PACIFIC. IACR Communications in Cryptology 1(2) (2024). https:\/\/doi.org\/10.62056\/ay11fhbmo","DOI":"10.62056\/ay11fhbmo"},{"key":"10_CR22","unstructured":"Griffy, S., Lysyanskaya, A., Mir, O., Kempner, O.P., Slamanig, D.: Delegatable anonymous credentials from mercurial signatures with stronger privacy. Cryptology ePrint Archive, Report 2024\/1216 (2024), https:\/\/eprint.iacr.org\/2024\/1216"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"Groth, J., Kohlweiss, M., Maller, M., Meiklejohn, S., Miers, I.: Updatable and universal common reference strings with applications to zk-SNARKs. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO\u00a02018, Part\u00a0III. LNCS, vol. 10993, pp. 698\u2013728. Springer, Cham (Aug 2018). https:\/\/doi.org\/10.1007\/978-3-319-96878-0_24","DOI":"10.1007\/978-3-319-96878-0_24"},{"key":"10_CR24","doi-asserted-by":"publisher","unstructured":"Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT\u00a02008. LNCS, vol.\u00a04965, pp. 415\u2013432. Springer, Berlin, Heidelberg (Apr 2008). https:\/\/doi.org\/10.1007\/978-3-540-78967-3_24","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"10_CR25","doi-asserted-by":"publisher","unstructured":"Hanser, C., Slamanig, D.: Structure-preserving signatures on equivalence classes and their application to anonymous credentials. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT\u00a02014, Part\u00a0I. LNCS, vol.\u00a08873, pp. 491\u2013511. Springer, Berlin, Heidelberg (Dec 2014).https:\/\/doi.org\/10.1007\/978-3-662-45611-8_26","DOI":"10.1007\/978-3-662-45611-8_26"},{"key":"10_CR26","doi-asserted-by":"publisher","unstructured":"Hanzlik, L., Slamanig, D.: With a little help from my friends: Constructing practical anonymous credentials. In: Vigna, G., Shi, E. (eds.) ACM CCS 2021. pp. 2004\u20132023. ACM Press (Nov 2021).https:\/\/doi.org\/10.1145\/3460120.3484582","DOI":"10.1145\/3460120.3484582"},{"key":"10_CR27","doi-asserted-by":"publisher","unstructured":"Mir, O., Bauer, B., Griffy, S., Lysyanskaya, A., Slamanig, D.: Aggregate signatures with versatile randomization and issuer-hiding multi-authority anonymous credentials. In: Meng, W., Jensen, C.D., Cremers, C., Kirda, E. (eds.) ACM CCS 2023. pp. 30\u201344. ACM Press (Nov 2023). https:\/\/doi.org\/10.1145\/3576915.3623203","DOI":"10.1145\/3576915.3623203"},{"key":"10_CR28","doi-asserted-by":"publisher","unstructured":"Mir, O., Slamanig, D., Bauer, B., Mayrhofer, R.: Practical delegatable anonymous credentials from equivalence class signatures. Proc. Priv. Enhancing Technol. 2023(3), 488\u2013513 (2023). https:\/\/doi.org\/10.56553\/POPETS-2023-0093","DOI":"10.56553\/POPETS-2023-0093"},{"key":"10_CR29","doi-asserted-by":"publisher","unstructured":"Abe, M., Nanri, M., Perez Kempner, O., Tibouchi, M.: Interactive threshold mercurial signatures and applications. Cryptology ePrint Archive, Paper 2024\/625 (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_3, https:\/\/eprint.iacr.org\/2024\/625","DOI":"10.1007\/978-981-96-0891-1_3"},{"key":"10_CR30","doi-asserted-by":"publisher","unstructured":"Nikolaenko, V., Ragsdale, S., Bonneau, J., Boneh, D.: Powers-of-tau to the people: Decentralizing setup ceremonies. In: P\u00f6pper, C., Batina, L. (eds.) Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part III. Lecture Notes in Computer Science, vol. 14585, pp. 105\u2013134. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-54776-8_5","DOI":"10.1007\/978-3-031-54776-8_5"},{"key":"10_CR31","unstructured":"Putman, C., Martin, K.M.: Selective delegation of attributes in mercurial signature credentials. Cryptology ePrint Archive, Report 2023\/1896 (2023), https:\/\/eprint.iacr.org\/2023\/1896"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Putman, C., Martin, K.M.: Selective delegation of attributes in mercurial signature credentials. In: Quaglia, E.A. (ed.) Cryptography and Coding. pp. 181\u2013196. Springer Nature Switzerland, Cham (2024)","DOI":"10.1007\/978-3-031-47818-5_10"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Proceedings of the 16th Annual International Conference on Theory and Application of Cryptographic Techniques. p. 256\u2013266. EUROCRYPT\u201997, Springer-Verlag, Berlin, Heidelberg (1997)","DOI":"10.1007\/3-540-69053-0_18"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0888-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T09:35:46Z","timestamp":1733823346000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0888-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,11]]},"ISBN":["9789819608874","9789819608881"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0888-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,11]]},"assertion":[{"value":"11 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}