{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:16:42Z","timestamp":1763968602563,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608904"},{"type":"electronic","value":"9789819608911"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0891-1_7","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:37:58Z","timestamp":1733956678000},"page":"207-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Strongly Secure Universal Thresholdizer"],"prefix":"10.1007","author":[{"given":"Ehsan","family":"Ebrahimi","sequence":"first","affiliation":[]},{"given":"Anshu","family":"Yadav","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, and Hoeteck Wee. Functional encryption for threshold functions (or fuzzy ibe) from lattices. In PKC, volume 7293 of LNCS, pages 280\u2013297. Springer,Berlin,Heidelberg, 2012. https:\/\/doi.org\/10.1007\/978-3-642-30057-8_17.","DOI":"10.1007\/978-3-642-30057-8_17"},{"key":"7_CR2","doi-asserted-by":"publisher","unstructured":"Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, and Peter Rindal. Dise: Distributed symmetric-key encryption. In ACM-CCS, pages 1993\u20132010. ACM, 2018. https:\/\/doi.org\/10.1145\/3243734.3243774.","DOI":"10.1145\/3243734.3243774"},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Shweta Agrawal, Damien Stehl\u00e9, and Anshu Yadav. Round-optimal lattice-based threshold signatures, revisited. In 49th International Colloquium on Automata, Languages, and Programming (ICALP 2022), volume 229 of Leibniz International Proceedings in Informatics (LIPIcs), pages 8:1\u20138:20, 2022. https:\/\/doi.org\/10.4230\/LIPIcs.ICALP.2022.8.","DOI":"10.4230\/LIPIcs.ICALP.2022.8"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Mihir Bellare, Elizabeth\u00a0C. Crites, Chelsea Komlo, Mary Maller, Stefano Tessaro, and Chenzhi Zhu. Better than advertised security for non-interactive threshold signatures. In CRYPTO, volume 13510 of LNCS, pages 517\u2013550. Springer, 2022. https:\/\/doi.org\/10.1007\/978-3-031-15985-5_18.","DOI":"10.1007\/978-3-031-15985-5_18"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter\u00a0MR Rasmussen, and Amit Sahai. Threshold cryptosystems from threshold fully homomorphic encryption. In CRYPTO, volume 10991 of LNCS, pages 565\u2013596. Springer, Cham, 2018. https:\/\/doi.org\/10.1007\/978-3-319-96884-1_19.","DOI":"10.1007\/978-3-319-96884-1_19"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Shi Bai, Adeline Langlois, Tancr\u00e8de Lepoint, Damien Stehl\u00e9, and Ron Steinfeld. Improved security proofs in lattice-based cryptography: Using the r\u00e9nyi divergence rather than the statistical distance. In ASIACRYPT, pages 3\u201324. Springer Berlin Heidelberg, 2015. https:\/\/doi.org\/10.1007\/978-3-662-48797-6_1.","DOI":"10.1007\/978-3-662-48797-6_1"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Dan Boneh, Kevin Lewi, Hart Montgomery, and Ananth Raghunathan. Key homomorphic prfs and their applications. In CRYPTO, volume 8042 of LNCS, pages 410\u2013428. Springer, Berlin, Heidelberg, 2013. https:\/\/doi.org\/10.1007\/978-3-642-40041-4_23.","DOI":"10.1007\/978-3-642-40041-4_23"},{"key":"7_CR8","doi-asserted-by":"publisher","unstructured":"Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the weil pairing. J. Cryptol., 17(4):297\u2013319, 2004. https:\/\/doi.org\/10.1007\/s00145-004-0314-9.","DOI":"10.1007\/s00145-004-0314-9"},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Alexandra Boldyreva. Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In PKC, pages 31\u201346. Springer, 2002. https:\/\/doi.org\/10.1007\/3-540-36288-6_3.","DOI":"10.1007\/3-540-36288-6_3"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Alexandra Boldyreva. Threshold signatures, multisignatures and blind signatures based on the gap-diffie-hellman-group signature scheme. In PKC, pages 31\u201346. Springer, 2003. https:\/\/doi.org\/10.1007\/3-540-36288-6_3.","DOI":"10.1007\/3-540-36288-6_3"},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Abhishek Banerjee and Chris Peikert. New and improved key-homomorphic pseudorandom functions. In CRYPTO, volume 8616 of LNCS, pages 353\u2013370. Springer,Berlin,Heidelberg, 2014. https:\/\/doi.org\/10.1007\/978-3-662-44371-2_20.","DOI":"10.1007\/978-3-662-44371-2_20"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Mihir Bellare, Stefano Tessaro, and Chenzhi Zhu. Stronger security for non-interactive threshold signatures: Bls and frost. Cryptology ePrint Archive, 2022.","DOI":"10.1007\/978-3-031-15985-5_18"},{"key":"7_CR13","doi-asserted-by":"publisher","unstructured":"Zvika Brakerski and Vinod Vaikuntanathan. Efficient fully homomorphic encryption from (standard) LWE. In FOCS, pages 97\u2013106, 2011. https:\/\/doi.org\/10.1137\/120868669.","DOI":"10.1137\/120868669"},{"key":"7_CR14","unstructured":"Jung\u00a0Hee Cheon, Wonhee Cho, and Jiseung Kim. Improved universal thresholdizer from iterative shamir secret sharing. Cryptology ePrint Archive, Paper 2023\/545, 2023."},{"key":"7_CR15","doi-asserted-by":"publisher","unstructured":"Ran Canetti and Shafi Goldwasser. An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. In EUROCRYPT, volume 1592 of LNCS, pages 90\u2013106. Springer, 1999. https:\/\/doi.org\/10.1007\/3-540-48910-X_7.","DOI":"10.1007\/3-540-48910-X_7"},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Yvo Desmedt and Yair Frankel. Threshold cryptosystems. In CRYPTO, volume 435 of LNCS, pages 307\u2013315. Springer, 1989. https:\/\/doi.org\/10.1007\/0-387-34805-0_28.","DOI":"10.1007\/0-387-34805-0_28"},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Ivan Damg\u00e5rd, Claudio Orlandi, Akira Takahashi, and Mehdi Tibouchi. Two-round n-out-of-n and multi-signatures and trapdoor commitment from lattices. In PKC, pages 99\u2013130, Cham, 2021. Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-75245-3_5.","DOI":"10.1007\/978-3-030-75245-3_5"},{"key":"7_CR18","doi-asserted-by":"publisher","unstructured":"Rafael del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, and Markku-Juhani Saarinen. Threshold raccoon: Practical threshold signatures from standard lattice assumptions. In EUROCRYPT, pages 219\u2013248. Springer, 2024. https:\/\/doi.org\/10.1007\/978-3-031-58723-8_8.","DOI":"10.1007\/978-3-031-58723-8_8"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Kamil\u00a0Doruk Gur, Jonathan Katz, and Tjerand Silde. Two-round threshold lattice-based signatures from threshold homomorphic encryption. In Markku-Juhani Saarinen and Daniel Smith-Tone, editors, Post-Quantum Cryptography, pages 266\u2013300. Springer, 2024. https:\/\/doi.org\/10.1007\/978-3-031-62746-0_12.","DOI":"10.1007\/978-3-031-62746-0_12"},{"key":"7_CR20","doi-asserted-by":"publisher","unstructured":"Craig Gentry, Amit Sahai, and Brent Waters. Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. In CRYPTO, volume 8042 of LNCS, pages 75\u201392. Springer Berlin Heidelberg, 2013. https:\/\/doi.org\/10.1007\/978-3-642-40041-4_5.","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, and Yixian Yang. Efficient construction of cca-secure threshold pke based on hashed diffie\u2013hellman assumption. The Computer Journal, 56, 2013.","DOI":"10.1093\/comjnl\/bxs167"},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Chelsea Komlo and Ian Goldberg. FROST: flexible round-optimized schnorr threshold signatures. In SAC, LNCS, pages 34\u201365. Springer, 2020. https:\/\/doi.org\/10.1007\/978-3-030-81652-0_2.","DOI":"10.1007\/978-3-030-81652-0_2"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Sam Kim. Key-homomorphic pseudorandom functions from lwe with small modulus. In EUROCRYPT, volume 12106 of LNCS, pages 576\u2013607. Springer,Cham, 2020. https:\/\/doi.org\/10.1007\/978-3-030-45724-2_20.","DOI":"10.1007\/978-3-030-45724-2_20"},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Keith\u00a0M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, and Peter\u00a0R. Wild. Threshold MACs. In ICISC, volume 2587 of LNCS, pages 237\u2013252. Springer, 2002. https:\/\/doi.org\/10.1007\/3-540-36552-4_17.","DOI":"10.1007\/3-540-36552-4_17"},{"key":"7_CR25","unstructured":"Daniele Micciancio and Adam Suhl. Simulation-secure threshold PKE from LWE with polynomial modulus. Cryptology ePrint Archive, Paper 2023\/1728, 2023."},{"key":"7_CR26","doi-asserted-by":"publisher","unstructured":"Moni Naor, Benny Pinkas, and Omer Reingold. Distributed pseudo-random functions and kdcs. In EUROCRYPT, volume 1592 of LNCS, pages 327\u2013346. Springer,Berlin,Heidelberg, 1999. https:\/\/doi.org\/10.1007\/3-540-48910-X_23.","DOI":"10.1007\/3-540-48910-X_23"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Victor Shoup. Practical threshold signatures. In EUROCRYPT, volume 1807 of LNCS, pages 207\u2013220. Springer, 2000. https:\/\/doi.org\/10.1007\/3-540-45539-6_15.","DOI":"10.1007\/3-540-45539-6_15"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0891-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:41:45Z","timestamp":1733956905000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0891-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819608904","9789819608911"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0891-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}