{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T23:45:20Z","timestamp":1776296720481,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":60,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819608904","type":"print"},{"value":"9789819608911","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0891-1_3","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:37:25Z","timestamp":1733956645000},"page":"69-103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Interactive Threshold Mercurial Signatures and\u00a0Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1614-0587","authenticated-orcid":false,"given":"Masayuki","family":"Abe","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7390-5600","authenticated-orcid":false,"given":"Masaya","family":"Nanri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3377-9802","authenticated-orcid":false,"given":"Octavio Perez","family":"Kempner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2736-2963","authenticated-orcid":false,"given":"Mehdi","family":"Tibouchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Abe, M.: Robust distributed multiplication without interaction. In: Wiener, M.J. (ed.) CRYPTO\u201999. LNCS, vol.\u00a01666, pp. 130\u2013147. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a015\u201319, 1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_9","DOI":"10.1007\/3-540-48405-1_9"},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"AAbe, M., Fehr, S.: Adaptively secure feldman VSS and applications to universally-composable threshold cryptography. In: Franklin, M. (ed.) CRYPTO\u00a02004. LNCS, vol.\u00a03152, pp. 317\u2013334. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a015\u201319, 2004). https:\/\/doi.org\/10.1007\/978-3-540-28628-8_20","DOI":"10.1007\/978-3-540-28628-8_20"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure-preserving signatures and commitments to group elements. In: Rabin, T. (ed.) CRYPTO\u00a02010. LNCS, vol.\u00a06223, pp. 209\u2013236. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a015\u201319, 2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_12","DOI":"10.1007\/978-3-642-14623-7_12"},{"key":"3_CR4","doi-asserted-by":"publisher","unstructured":"Abe, M., Groth, J., Haralambiev, K., Ohkubo, M.: Optimal structure-preserving signatures in asymmetric bilinear groups. In: Rogaway, P. (ed.) CRYPTO\u00a02011. LNCS, vol.\u00a06841, pp. 649\u2013666. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a014\u201318, 2011). https:\/\/doi.org\/10.1007\/978-3-642-22792-9_37","DOI":"10.1007\/978-3-642-22792-9_37"},{"key":"3_CR5","unstructured":"Abe, M., Nanri, M., Perez Kempner, O., Tibouchi, M.: Interactive threshold mercurial signatures and applications. Cryptology ePrint Archive, Paper 2024\/625 (2024), https:\/\/eprint.iacr.org\/2024\/625"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Alper, H.K., Burdges, J.: Two-round trip schnorr multi-signatures via delinearized witnesses. In: Malkin, T., Peikert, C. (eds.) CRYPTO\u00a02021, Part\u00a0I. LNCS, vol. 12825, pp. 157\u2013188. Springer, Heidelberg, Germany, Virtual Event (Aug\u00a016\u201320, 2021). https:\/\/doi.org\/10.1007\/978-3-030-84242-0_7","DOI":"10.1007\/978-3-030-84242-0_7"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Bacho, R., Loss, J.: On the adaptive security of the threshold BLS signature scheme. In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) ACM CCS 2022. pp. 193\u2013207. ACM Press, Los Angeles, CA, USA (Nov\u00a07\u201311, 2022). https:\/\/doi.org\/10.1145\/3548606.3560656","DOI":"10.1145\/3548606.3560656"},{"key":"3_CR8","doi-asserted-by":"publisher","unstructured":"Backes, M., Hanzlik, L., Kluczniak, K., Schneider, J.: Signatures with flexible public key: Introducing equivalence classes for public keys. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT\u00a02018, Part\u00a0II. LNCS, vol. 11273, pp. 405\u2013434. Springer, Heidelberg, Germany, Brisbane, Queensland, Australia (Dec\u00a02\u20136, 2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_14","DOI":"10.1007\/978-3-030-03329-3_14"},{"key":"3_CR9","doi-asserted-by":"publisher","unstructured":"Backes, M., Hanzlik, L., Schneider-Bensch, J.: Membership privacy for fully dynamic group signatures. In: Cavallaro, L., Kinder, J., Wang, X., Katz, J. (eds.) ACM CCS 2019. pp. 2181\u20132198. ACM Press, London, UK (Nov\u00a011\u201315, 2019). https:\/\/doi.org\/10.1145\/3319535.3354257","DOI":"10.1145\/3319535.3354257"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Bauer, B., Fuchsbauer, G.: Efficient signatures on randomizable ciphertexts. In: Galdi, C., Kolesnikov, V. (eds.) SCN 20. LNCS, vol. 12238, pp. 359\u2013381. Springer, Heidelberg, Germany, Amalfi, Italy (Sep\u00a014\u201316, 2020). https:\/\/doi.org\/10.1007\/978-3-030-57990-6_18","DOI":"10.1007\/978-3-030-57990-6_18"},{"key":"3_CR11","unstructured":"Bauer, B., Fuchsbauer, G.: On security proofs of existing equivalence class signature schemes. Cryptology ePrint Archive, Paper 2024\/183 (2024), https:\/\/eprint.iacr.org\/2024\/183"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Bauer, B., Fuchsbauer, G., Regen, F.: On proving equivalence class signatures secure from non-interactive assumptions. In: Tang, Q., Teague, V. (eds.) Public-Key Cryptography \u2013 PKC 2024. pp. 3\u201336. Springer Nature Switzerland, Cham (2024)","DOI":"10.1007\/978-3-031-57718-5_1"},{"key":"3_CR13","doi-asserted-by":"publisher","unstructured":"Bellare, M., Crites, E.C., Komlo, C., Maller, M., Tessaro, S., Zhu, C.: Better than advertised security for non-interactive threshold signatures. In: Dodis, Y., Shrimpton, T. (eds.) CRYPTO\u00a02022, Part\u00a0IV. LNCS, vol. 13510, pp. 517\u2013550. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a015\u201318, 2022). https:\/\/doi.org\/10.1007\/978-3-031-15985-5_18","DOI":"10.1007\/978-3-031-15985-5_18"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Blazy, O., Fuchsbauer, G., Pointcheval, D., Vergnaud, D.: Signatures on randomizable ciphertexts. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC\u00a02011. LNCS, vol.\u00a06571, pp. 403\u2013422. Springer, Heidelberg, Germany, Taormina, Italy (Mar\u00a06\u20139, 2011). https:\/\/doi.org\/10.1007\/978-3-642-19379-8_25","DOI":"10.1007\/978-3-642-19379-8_25"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Bobolz, J., Eidens, F., Krenn, S., Ramacher, S., Samelin, K.: Issuer-hiding attribute-based credentials. In: Conti, M., Stevens, M., Krenn, S. (eds.) CANS 21. LNCS, vol. 13099, pp. 158\u2013178. Springer, Heidelberg, Germany, Vienna, Austria (Dec\u00a013\u201315, 2021). https:\/\/doi.org\/10.1007\/978-3-030-92548-2_9","DOI":"10.1007\/978-3-030-92548-2_9"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: Desmedt, Y. (ed.) PKC\u00a02003. LNCS, vol.\u00a02567, pp. 31\u201346. Springer, Heidelberg, Germany, Miami, FL, USA (Jan\u00a06\u20138, 2003). https:\/\/doi.org\/10.1007\/3-540-36288-6_3","DOI":"10.1007\/3-540-36288-6_3"},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT\u00a02001. LNCS, vol.\u00a02248, pp. 514\u2013532. Springer, Heidelberg, Germany, Gold Coast, Australia (Dec\u00a09\u201313, 2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_30","DOI":"10.1007\/3-540-45682-1_30"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. Journal of Cryptology 17(4), 297\u2013319 (Sep 2004). https:\/\/doi.org\/10.1007\/s00145-004-0314-9","DOI":"10.1007\/s00145-004-0314-9"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Brand\u00e3o, L., Peralta, R.: Nist first call for multi-party threshold schemes. Online (2023), https:\/\/csrc.nist.gov\/pubs\/ir\/8214\/c\/ipd","DOI":"10.6028\/NIST.IR.8214C.ipd"},{"key":"3_CR20","doi-asserted-by":"publisher","unstructured":"Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures and applications to ad-hoc groups. In: Yung, M. (ed.) CRYPTO\u00a02002. LNCS, vol.\u00a02442, pp. 465\u2013480. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a018\u201322, 2002). https:\/\/doi.org\/10.1007\/3-540-45708-9_30","DOI":"10.1007\/3-540-45708-9_30"},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Bultel, X., Lafourcade, P., Lai, R.W.F., Malavolta, G., Schr\u00f6der, D., Thyagarajan, S.A.K.: Efficient invisible and unlinkable sanitizable signatures. In: Lin, D., Sako, K. (eds.) PKC\u00a02019, Part\u00a0I. LNCS, vol. 11442, pp. 159\u2013189. Springer, Heidelberg, Germany, Beijing, China (Apr\u00a014\u201317, 2019). https:\/\/doi.org\/10.1007\/978-3-030-17253-4_6","DOI":"10.1007\/978-3-030-17253-4_6"},{"key":"3_CR22","unstructured":"Celi, S., Griffy, S., Hanzlik, L., Perez Kempner, O., Slamanig, D.: Sok: Signatures with randomizable keys. Cryptology ePrint Archive, Paper 2023\/1524 (2023), https:\/\/eprint.iacr.org\/2023\/1524"},{"key":"3_CR23","doi-asserted-by":"publisher","unstructured":"Chase, M., Kohlweiss, M., Lysyanskaya, A., Meiklejohn, S.: Malleable signatures: New definitions and delegatable anonymous credentials. In: Datta, A., Fournet, C. (eds.) CSF 2014 Computer Security Foundations Symposium. pp. 199\u2013213. IEEE Computer Society Press, Vienna, Austria (Jul\u00a019\u201322, 2014). https:\/\/doi.org\/10.1109\/CSF.2014.22","DOI":"10.1109\/CSF.2014.22"},{"key":"3_CR24","doi-asserted-by":"publisher","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO\u201992. LNCS, vol.\u00a0740, pp. 89\u2013105. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a016\u201320, 1993). https:\/\/doi.org\/10.1007\/3-540-48071-4_7","DOI":"10.1007\/3-540-48071-4_7"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Chen, Y.H., Lindell, Y.: Feldman\u2019s verifiable secret sharing for a dishonest majority. Cryptology ePrint Archive, Paper 2024\/031 (2024), https:\/\/eprint.iacr.org\/2024\/031","DOI":"10.62056\/ak2isgvtw"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Chen, Y.H., Lindell, Y.: Optimizing and implementing fischlin\u2019s transform for uc-secure zero-knowledge. Cryptology ePrint Archive, Paper 2024\/526 (2024), https:\/\/eprint.iacr.org\/2024\/526","DOI":"10.62056\/a66chey6b"},{"key":"3_CR27","doi-asserted-by":"publisher","unstructured":"Connolly, A., Deschamps, J., Lafourcade, P., Perez-Kempner, O.: Protego: Efficient, revocable and auditable anonymous credentials with applications to hyperledger fabric. In: Isobe, T., Sarkar, S. (eds.) Progress in Cryptology - INDOCRYPT 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings. Lecture Notes in Computer Science, vol. 13774, pp. 249\u2013271. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-22912-1_11","DOI":"10.1007\/978-3-031-22912-1_11"},{"key":"3_CR28","doi-asserted-by":"publisher","unstructured":"Connolly, A., Lafourcade, P., Perez-Kempner, O.: Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes. In: Hanaoka, G., Shikata, J., Watanabe, Y. (eds.) PKC\u00a02022, Part\u00a0I. LNCS, vol. 13177, pp. 409\u2013438. Springer, Heidelberg, Germany, Virtual Event (Mar\u00a08\u201311, 2022). https:\/\/doi.org\/10.1007\/978-3-030-97121-2_15","DOI":"10.1007\/978-3-030-97121-2_15"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Crites, E., Kohlweiss, M., Preneel, B., Sedaghat, M., Slamanig, D.: Threshold structure-preserving signatures. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2023. pp. 348\u2013382. Springer Nature Singapore, Singapore (2023)","DOI":"10.1007\/978-981-99-8724-5_11"},{"key":"3_CR30","doi-asserted-by":"publisher","unstructured":"Crites, E.C., Komlo, C., Maller, M.: Fully adaptive schnorr threshold signatures. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO\u00a02023, Part\u00a0I. LNCS, vol. 14081, pp. 678\u2013709. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a020\u201324, 2023). https:\/\/doi.org\/10.1007\/978-3-031-38557-5_22","DOI":"10.1007\/978-3-031-38557-5_22"},{"key":"3_CR31","doi-asserted-by":"publisher","unstructured":"Crites, E.C., Komlo, C., Maller, M., Tessaro, S., Zhu, C.: Snowblind: A threshold blind signature in pairing-free groups. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO\u00a02023, Part\u00a0I. LNCS, vol. 14081, pp. 710\u2013742. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a020\u201324, 2023). https:\/\/doi.org\/10.1007\/978-3-031-38557-5_23","DOI":"10.1007\/978-3-031-38557-5_23"},{"key":"3_CR32","doi-asserted-by":"publisher","unstructured":"Crites, E.C., Lysyanskaya, A.: Delegatable anonymous credentials from mercurial signatures. In: Matsui, M. (ed.) CT-RSA\u00a02019. LNCS, vol. 11405, pp. 535\u2013555. Springer, Heidelberg, Germany, San Francisco, CA, USA (Mar\u00a04\u20138, 2019). https:\/\/doi.org\/10.1007\/978-3-030-12612-4_27","DOI":"10.1007\/978-3-030-12612-4_27"},{"key":"3_CR33","doi-asserted-by":"publisher","unstructured":"Crites, E.C., Lysyanskaya, A.: Mercurial signatures for variable-length messages. PoPETs 2021(4), 441\u2013463 (Oct 2021). https:\/\/doi.org\/10.2478\/popets-2021-0079","DOI":"10.2478\/popets-2021-0079"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Das, S., Ren, L.: Adaptively secure bls threshold signatures from ddh and co-cdh. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology \u2013 CRYPTO 2024. pp. 251\u2013284. Springer Nature Switzerland, Cham (2024)","DOI":"10.1007\/978-3-031-68394-7_9"},{"key":"3_CR35","doi-asserted-by":"publisher","unstructured":"Derler, D., Hanser, C., Slamanig, D.: A new approach to efficient revocable attribute-based anonymous credentials. In: Groth, J. (ed.) 15th IMA International Conference on Cryptography and Coding. LNCS, vol.\u00a09496, pp. 57\u201374. Springer, Heidelberg, Germany, Oxford, UK (Dec\u00a015\u201317, 2015). https:\/\/doi.org\/10.1007\/978-3-319-27239-9_4","DOI":"10.1007\/978-3-319-27239-9_4"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Derler, D., Slamanig, D.: Highly-efficient fully-anonymous dynamic group signatures. In: Kim, J., Ahn, G.J., Kim, S., Kim, Y., L\u00f3pez, J., Kim, T. (eds.) ASIACCS 18. pp. 551\u2013565. ACM Press, Incheon, Republic of Korea (Apr\u00a02\u20136, 2018)","DOI":"10.1145\/3196494.3196507"},{"key":"3_CR37","doi-asserted-by":"publisher","unstructured":"Derler, D., Slamanig, D.: Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge. Designs, Codes and Cryptography 87(6), 1373\u20131413 (2019). https:\/\/doi.org\/10.1007\/s10623-018-0535-9","DOI":"10.1007\/s10623-018-0535-9"},{"key":"3_CR38","doi-asserted-by":"publisher","unstructured":"Drijvers, M., Edalatnejad, K., Ford, B., Kiltz, E., Loss, J., Neven, G., Stepanovs, I.: On the security of two-round multi-signatures. In: 2019 IEEE Symposium on Security and Privacy. pp. 1084\u20131101. IEEE Computer Society Press, San Francisco, CA, USA (May\u00a019\u201323, 2019). https:\/\/doi.org\/10.1109\/SP.2019.00050","DOI":"10.1109\/SP.2019.00050"},{"key":"3_CR39","doi-asserted-by":"publisher","unstructured":"Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: 28th FOCS. pp. 427\u2013437. IEEE Computer Society Press, Los Angeles, CA, USA (Oct\u00a012\u201314, 1987). https:\/\/doi.org\/10.1109\/SFCS.1987.4","DOI":"10.1109\/SFCS.1987.4"},{"key":"3_CR40","doi-asserted-by":"publisher","unstructured":"Fischlin, M.: Communication-efficient non-interactive proofs of knowledge with online extractors. In: Shoup, V. (ed.) CRYPTO\u00a02005. LNCS, vol.\u00a03621, pp. 152\u2013168. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a014\u201318, 2005). https:\/\/doi.org\/10.1007\/11535218_10","DOI":"10.1007\/11535218_10"},{"key":"3_CR41","doi-asserted-by":"publisher","unstructured":"Fuchsbauer, G., Hanser, C., Kamath, C., Slamanig, D.: Practical round-optimal blind signatures in the standard model from weaker assumptions. In: Zikas, V., De Prisco, R. (eds.) SCN 16. LNCS, vol.\u00a09841, pp. 391\u2013408. Springer, Heidelberg, Germany, Amalfi, Italy (Aug\u00a031\u00a0\u2013\u00a0Sep\u00a02, 2016). https:\/\/doi.org\/10.1007\/978-3-319-44618-9_21","DOI":"10.1007\/978-3-319-44618-9_21"},{"key":"3_CR42","doi-asserted-by":"publisher","unstructured":"Fuchsbauer, G., Hanser, C., Slamanig, D.: Practical round-optimal blind signatures in the standard model. In: Gennaro, R., Robshaw, M.J.B. (eds.) CRYPTO\u00a02015, Part\u00a0II. LNCS, vol.\u00a09216, pp. 233\u2013253. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a016\u201320, 2015). https:\/\/doi.org\/10.1007\/978-3-662-48000-7_12","DOI":"10.1007\/978-3-662-48000-7_12"},{"key":"3_CR43","doi-asserted-by":"publisher","unstructured":"Fuchsbauer, G., Hanser, C., Slamanig, D.: Structure-preserving signatures on equivalence classes and constant-size anonymous credentials. Journal of Cryptology 32(2), 498\u2013546 (Apr 2019). https:\/\/doi.org\/10.1007\/s00145-018-9281-4","DOI":"10.1007\/s00145-018-9281-4"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Kahan, A.: How to construct constant-round zero-knowledge proof systems for NP. Journal of Cryptology 9(3), 167\u2013190 (Jun 1996)","DOI":"10.1007\/s001459900010"},{"key":"3_CR45","doi-asserted-by":"publisher","unstructured":"Hanser, C., Slamanig, D.: Structure-preserving signatures on equivalence classes and their application to anonymous credentials. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT\u00a02014, Part\u00a0I. LNCS, vol.\u00a08873, pp. 491\u2013511. Springer, Heidelberg, Germany, Kaoshiung, Taiwan, R.O.C. (Dec\u00a07\u201311, 2014). https:\/\/doi.org\/10.1007\/978-3-662-45611-8_26","DOI":"10.1007\/978-3-662-45611-8_26"},{"key":"3_CR46","doi-asserted-by":"publisher","unstructured":"Hanzlik, L., Slamanig, D.: With a little help from my friends: Constructing practical anonymous credentials. In: Vigna, G., Shi, E. (eds.) ACM CCS 2021. pp. 2004\u20132023. ACM Press, Virtual Event, Republic of Korea (Nov\u00a015\u201319, 2021). https:\/\/doi.org\/10.1145\/3460120.3484582","DOI":"10.1145\/3460120.3484582"},{"key":"3_CR47","unstructured":"Katz, J.: Round optimal fully secure distributed key generation. Cryptology ePrint Archive, Paper 2023\/1094 (2023), https:\/\/eprint.iacr.org\/2023\/1094"},{"key":"3_CR48","unstructured":"Labs, P.: Blast: Multilingual bls12-381 signature library. Online (2020), https:\/\/github.com\/supranational\/blst"},{"key":"3_CR49","unstructured":"Labs, P.: High performance implementation of bls12 381. Online (2021), https:\/\/github.com\/filecoin-project\/blstrs"},{"key":"3_CR50","doi-asserted-by":"publisher","unstructured":"Mir, O., Bauer, B., Griffy, S., Lysyanskaya, A., Slamanig, D.: Aggregate signatures with versatile randomization and issuer-hiding multi-authority anonymous credentials. In: Meng, W., Jensen, C.D., Cremers, C., Kirda, E. (eds.) Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023. pp. 30\u201344. ACM (2023). https:\/\/doi.org\/10.1145\/3576915.3623203","DOI":"10.1145\/3576915.3623203"},{"key":"3_CR51","doi-asserted-by":"crossref","unstructured":"Mitrokotsa, A., Mukherjee, S., Sedaghat, M., Slamanig, D., Tomy, J.: Threshold structure-preserving signatures: Strong and adaptive security under standard assumptions. In: Tang, Q., Teague, V. (eds.) Public-Key Cryptography \u2013 PKC 2024. pp. 163\u2013195. Springer Nature Switzerland, Cham (2024)","DOI":"10.1007\/978-3-031-57718-5_6"},{"key":"3_CR52","unstructured":"Nanri, M.: Implementation of interactive threshold mercurial signatures. Online (2024), https:\/\/github.com\/octaviopk9\/asiacrypt_tms"},{"key":"3_CR53","doi-asserted-by":"publisher","unstructured":"Nick, J., Ruffing, T., Seurin, Y.: MuSig2: Simple two-round Schnorr multi-signatures. In: Malkin, T., Peikert, C. (eds.) CRYPTO\u00a02021, Part\u00a0I. LNCS, vol. 12825, pp. 189\u2013221. Springer, Heidelberg, Germany, Virtual Event (Aug\u00a016\u201320, 2021). https:\/\/doi.org\/10.1007\/978-3-030-84242-0_8","DOI":"10.1007\/978-3-030-84242-0_8"},{"key":"3_CR54","doi-asserted-by":"publisher","unstructured":"Pedersen, T.P.: A threshold cryptosystem without a trusted party (extended abstract) (rump session). In: Davies, D.W. (ed.) EUROCRYPT\u201991. LNCS, vol.\u00a0547, pp. 522\u2013526. Springer, Heidelberg, Germany, Brighton, UK (Apr\u00a08\u201311, 1991). https:\/\/doi.org\/10.1007\/3-540-46416-6_47","DOI":"10.1007\/3-540-46416-6_47"},{"key":"3_CR55","doi-asserted-by":"publisher","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO\u201991. LNCS, vol.\u00a0576, pp. 129\u2013140. Springer, Heidelberg, Germany, Santa Barbara, CA, USA (Aug\u00a011\u201315, 1992). https:\/\/doi.org\/10.1007\/3-540-46766-1_9","DOI":"10.1007\/3-540-46766-1_9"},{"key":"3_CR56","doi-asserted-by":"publisher","unstructured":"Pointcheval, D., Sanders, O.: Short randomizable signatures. In: Sako, K. (ed.) CT-RSA\u00a02016. LNCS, vol.\u00a09610, pp. 111\u2013126. Springer, Heidelberg, Germany, San Francisco, CA, USA (Feb\u00a029\u00a0\u2013\u00a0Mar\u00a04, 2016). https:\/\/doi.org\/10.1007\/978-3-319-29485-8_7","DOI":"10.1007\/978-3-319-29485-8_7"},{"key":"3_CR57","doi-asserted-by":"publisher","unstructured":"Pointcheval, D., Sanders, O.: Reassessing security of randomizable signatures. In: Smart, N.P. (ed.) CT-RSA\u00a02018. LNCS, vol. 10808, pp. 319\u2013338. Springer, Heidelberg, Germany, San Francisco, CA, USA (Apr\u00a016\u201320, 2018). https:\/\/doi.org\/10.1007\/978-3-319-76953-0_17","DOI":"10.1007\/978-3-319-76953-0_17"},{"key":"3_CR58","doi-asserted-by":"crossref","unstructured":"Putman, C., Martin, K.M.: Selective delegation of attributes in mercurial signature credentials. In: Quaglia, E.A. (ed.) Cryptography and Coding. pp. 181\u2013196. Springer Nature Switzerland, Cham (2024)","DOI":"10.1007\/978-3-031-47818-5_10"},{"key":"3_CR59","doi-asserted-by":"publisher","unstructured":"Sanders, O., Traor\u00e9, J.: Compact issuer-hiding authentication, application to anonymous credential. Proc. Priv. Enhancing Technol. 2024(3), 645\u2013658 (2024). https:\/\/doi.org\/10.56553\/POPETS-2024-0097","DOI":"10.56553\/POPETS-2024-0097"},{"key":"3_CR60","doi-asserted-by":"publisher","unstructured":"Tessaro, S., Zhu, C.: Short pairing-free blind signatures with exponential security. In: Dunkelman, O., Dziembowski, S. (eds.) EUROCRYPT\u00a02022, Part\u00a0II. LNCS, vol. 13276, pp. 782\u2013811. Springer, Heidelberg, Germany, Trondheim, Norway (May\u00a030\u00a0\u2013\u00a0Jun\u00a03, 2022). https:\/\/doi.org\/10.1007\/978-3-031-07085-3_27","DOI":"10.1007\/978-3-031-07085-3_27"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0891-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:42:27Z","timestamp":1733956947000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0891-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819608904","9789819608911"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0891-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}