{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T23:02:47Z","timestamp":1765062167022,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608874"},{"type":"electronic","value":"9789819608881"}],"license":[{"start":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:00:00Z","timestamp":1733875200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T00:00:00Z","timestamp":1733875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0888-1_4","type":"book-chapter","created":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T09:12:41Z","timestamp":1733821961000},"page":"105-137","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Dictators? Friends? Forgers."],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4934-3405","authenticated-orcid":false,"given":"Joseph","family":"Jaeger","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0662-6061","authenticated-orcid":false,"given":"Roy","family":"Stracovsky","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,11]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Magri, B., Venturi, D.: Subversion-resilient signatures: Definitions, constructions and applications. Theoretical Computer Science 820, 91\u2013122 (2020). https:\/\/doi.org\/10.1016\/j.tcs.2020.03.021, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0304397520301808","DOI":"10.1016\/j.tcs.2020.03.021"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Banfi, F., Gegier, K., Hirt, M., Maurer, U., Rito, G.: Anamorphic encryption, revisited. In: Joye, M., Leander, G. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02024, Part\u00a0II. Lecture Notes in Computer Science, vol. 14652, pp. 3\u201332. Springer, Cham, Switzerland, Zurich, Switzerland (May\u00a026\u201330, 2024). https:\/\/doi.org\/10.1007\/978-3-031-58723-8_1","DOI":"10.1007\/978-3-031-58723-8_1"},{"key":"4_CR3","doi-asserted-by":"publisher","unstructured":"Bellare, M., Jaeger, J., Kane, D.: Mass-surveillance without the state: Strongly undetectable algorithm-substitution attacks. In: Ray, I., Li, N., Kruegel, C. (eds.) ACM CCS 2015: 22nd Conference on Computer and Communications Security. pp. 1431\u20131440. ACM Press, Denver, CO, USA (Oct\u00a012\u201316, 2015). https:\/\/doi.org\/10.1145\/2810103.2813681","DOI":"10.1145\/2810103.2813681"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Bellare, M., Paterson, K.G., Rogaway, P.: Security of symmetric encryption against mass surveillance. In: Garay, J.A., Gennaro, R. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02014, Part\u00a0I. Lecture Notes in Computer Science, vol.\u00a08616, pp. 1\u201319. Springer, Berlin, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a017\u201321, 2014). https:\/\/doi.org\/10.1007\/978-3-662-44371-2_1","DOI":"10.1007\/978-3-662-44371-2_1"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signatures: How to sign with RSA and Rabin. In: Maurer, U.M. (ed.) Advances in Cryptology \u2013 EUROCRYPT\u201996. Lecture Notes in Computer Science, vol.\u00a01070, pp. 399\u2013416. Springer, Berlin, Heidelberg, Germany, Saragossa, Spain (May\u00a012\u201316, 1996). https:\/\/doi.org\/10.1007\/3-540-68339-9_34","DOI":"10.1007\/3-540-68339-9_34"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) Advances in Cryptology \u2013 EUROCRYPT\u00a02006. Lecture Notes in Computer Science, vol.\u00a04004, pp. 409\u2013426. Springer, Berlin, Heidelberg, Germany, St. Petersburg, Russia (May\u00a028\u00a0\u2013\u00a0Jun\u00a01, 2006). https:\/\/doi.org\/10.1007\/11761679_25","DOI":"10.1007\/11761679_25"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02004. Lecture Notes in Computer Science, vol.\u00a03027, pp. 56\u201373. Springer, Berlin, Heidelberg, Germany, Interlaken, Switzerland (May\u00a02\u20136, 2004). https:\/\/doi.org\/10.1007\/978-3-540-24676-3_4","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Camenisch, J., Drijvers, M., Gagliardoni, T., Lehmann, A., Neven, G.: The wonderful world of global random oracles. In: Nielsen, J.B., Rijmen, V. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02018, Part\u00a0I. Lecture Notes in Computer Science, vol. 10820, pp. 280\u2013312. Springer, Cham, Switzerland, Tel Aviv, Israel (Apr\u00a029\u00a0\u2013\u00a0May\u00a03, 2018). https:\/\/doi.org\/10.1007\/978-3-319-78381-9_11","DOI":"10.1007\/978-3-319-78381-9_11"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Catalano, D., Giunta, E., Migliaro, F.: Anamorphic encryption: New constructions and homomorphic realizations. In: Joye, M., Leander, G. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02024, Part\u00a0II. Lecture Notes in Computer Science, vol. 14652, pp. 33\u201362. Springer, Cham, Switzerland, Zurich, Switzerland (May\u00a026\u201330, 2024). https:\/\/doi.org\/10.1007\/978-3-031-58723-8_2","DOI":"10.1007\/978-3-031-58723-8_2"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/3-540-49380-8_25","volume-title":"Information Hiding","author":"S Craver","year":"1998","unstructured":"Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) Information Hiding. pp. 355\u2013368. Springer Berlin Heidelberg, Berlin, Heidelberg (1998)"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Degabriele, J.P., Farshim, P., Poettering, B.: A more cautious approach to security against mass surveillance. In: Leander, G. (ed.) Fast Software Encryption \u2013 FSE\u00a02015. Lecture Notes in Computer Science, vol.\u00a09054, pp. 579\u2013598. Springer, Berlin, Heidelberg, Germany, Istanbul, Turkey (Mar\u00a08\u201311, 2015). https:\/\/doi.org\/10.1007\/978-3-662-48116-5_28","DOI":"10.1007\/978-3-662-48116-5_28"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology \u2013 CRYPTO\u201984. Lecture Notes in Computer Science, vol.\u00a0196, pp. 10\u201318. Springer, Berlin, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a019\u201323, 1984). https:\/\/doi.org\/10.1007\/3-540-39568-7_2","DOI":"10.1007\/3-540-39568-7_2"},{"key":"4_CR13","doi-asserted-by":"publisher","unstructured":"Jaeger, J.: Let attackers program ideal models: Modularity and composability for adaptive compromise. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02023, Part\u00a0III. Lecture Notes in Computer Science, vol. 14006, pp. 101\u2013131. Springer, Cham, Switzerland, Lyon, France (Apr\u00a023\u201327, 2023). https:\/\/doi.org\/10.1007\/978-3-031-30620-4_4","DOI":"10.1007\/978-3-031-30620-4_4"},{"key":"4_CR14","doi-asserted-by":"publisher","unstructured":"Jaeger, J., Tyagi, N.: Handling adaptive compromise for practical encryption schemes. In: Micciancio, D., Ristenpart, T. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02020, Part\u00a0I. Lecture Notes in Computer Science, vol. 12170, pp. 3\u201332. Springer, Cham, Switzerland, Santa Barbara, CA, USA (Aug\u00a017\u201321, 2020). https:\/\/doi.org\/10.1007\/978-3-030-56784-2_1","DOI":"10.1007\/978-3-030-56784-2_1"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Kutylowski, M., Persiano, G., Phan, D.H., Yung, M., Zawada, M.: Anamorphic signatures: Secrecy from a dictator who only permits authentication! In: Handschuh, H., Lysyanskaya, A. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02023, Part\u00a0II. Lecture Notes in Computer Science, vol. 14082, pp. 759\u2013790. Springer, Cham, Switzerland, Santa Barbara, CA, USA (Aug\u00a020\u201324, 2023). https:\/\/doi.org\/10.1007\/978-3-031-38545-2_25","DOI":"10.1007\/978-3-031-38545-2_25"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Kutylowski, M., Persiano, G., Phan, D.H., Yung, M., Zawada, M.: The self-anti-censorship nature of encryption: On the prevalence of anamorphic cryptography. Proc. Priv. Enhancing Technol. 2023(4), 170\u2013183 (2023). https:\/\/doi.org\/10.56553\/POPETS-2023-0104, https:\/\/doi.org\/10.56553\/popets-2023-0104","DOI":"10.56553\/POPETS-2023-0104"},{"key":"4_CR17","doi-asserted-by":"publisher","unstructured":"Mironov, I., Stephens-Davidowitz, N.: Cryptographic reverse firewalls. In: Oswald, E., Fischlin, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02015, Part\u00a0II. Lecture Notes in Computer Science, vol.\u00a09057, pp. 657\u2013686. Springer, Berlin, Heidelberg, Germany, Sofia, Bulgaria (Apr\u00a026\u201330, 2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_22","DOI":"10.1007\/978-3-662-46803-6_22"},{"key":"4_CR18","doi-asserted-by":"publisher","unstructured":"Persiano, G., Phan, D.H., Yung, M.: Anamorphic encryption: Private communication against a dictator. In: Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02022, Part\u00a0II. Lecture Notes in Computer Science, vol. 13276, pp. 34\u201363. Springer, Cham, Switzerland, Trondheim, Norway (May\u00a030\u00a0\u2013\u00a0Jun\u00a03, 2022). https:\/\/doi.org\/10.1007\/978-3-031-07085-3_2","DOI":"10.1007\/978-3-031-07085-3_2"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Simmons, G.J.: The prisoners\u2019 problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology \u2013 CRYPTO\u201983. pp. 51\u201367. Plenum Press, New York, USA, Santa Barbara, CA, USA (1983). https:\/\/doi.org\/10.1007\/978-1-4684-4730-9_5","DOI":"10.1007\/978-1-4684-4730-9_5"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Wang, Y., Chen, R., Huang, X., Yung, M.: Sender-anamorphic encryption reformulated: Achieving robust and generic constructions. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02023, Part\u00a0VI. Lecture Notes in Computer Science, vol. 14443, pp. 135\u2013167. Springer, Singapore, Singapore, Guangzhou, China (Dec\u00a04\u20138, 2023). https:\/\/doi.org\/10.1007\/978-981-99-8736-8_5","DOI":"10.1007\/978-981-99-8736-8_5"},{"key":"4_CR21","doi-asserted-by":"publisher","unstructured":"Young, A., Yung, M.: Kleptography: Using cryptography against cryptography. In: Fumy, W. (ed.) Advances in Cryptology \u2013 EUROCRYPT\u201997. Lecture Notes in Computer Science, vol.\u00a01233, pp. 62\u201374. Springer, Berlin, Heidelberg, Germany, Konstanz, Germany (May\u00a011\u201315, 1997). https:\/\/doi.org\/10.1007\/3-540-69053-0_6","DOI":"10.1007\/3-540-69053-0_6"},{"key":"4_CR22","doi-asserted-by":"publisher","unstructured":"Young, A., Yung, M.: A subliminal channel in secret block ciphers. In: Handschuh, H., Hasan, A. (eds.) SAC 2004: 11th Annual International Workshop on Selected Areas in Cryptography. Lecture Notes in Computer Science, vol.\u00a03357, pp. 198\u2013211. Springer, Berlin, Heidelberg, Germany, Waterloo, Ontario, Canada (Aug\u00a09\u201310, 2004). https:\/\/doi.org\/10.1007\/978-3-540-30564-4_14","DOI":"10.1007\/978-3-540-30564-4_14"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0888-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T09:35:10Z","timestamp":1733823310000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0888-1_4"}},"subtitle":["Breaking and Fixing Unforgeability Definitions for Anamorphic Signature Schemes"],"short-title":[],"issued":{"date-parts":[[2024,12,11]]},"ISBN":["9789819608874","9789819608881"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0888-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,11]]},"assertion":[{"value":"11 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}