{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:11:04Z","timestamp":1742973064432,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819609536"},{"type":"electronic","value":"9789819609543"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0954-3_12","type":"book-chapter","created":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T17:50:46Z","timestamp":1738345846000},"page":"229-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generic Construction of\u00a0Withdrawable Signature from\u00a0Hash-Then-One-Way Signature"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1026-3712","authenticated-orcid":false,"given":"Xin","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1562-5105","authenticated-orcid":false,"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2613-2127","authenticated-orcid":false,"given":"Joonsang","family":"Baek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,1]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Abe, M., Ohkubo, M., Suzuki, K.: 1-out-of-n signatures from a variety of keys. In: Zheng, Y. (ed.) ASIACRYPT 2002, pp. 415\u2013432. Springer, Heidelberg (2002)","DOI":"10.1007\/3-540-36178-2_26"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Al-Maaitah, S., Qatawneh, M., Quzmar, A.: E-voting system based on blockchain technology: a survey. In: ICIT 2021, pp. 200\u2013205. IEEE (2021)","DOI":"10.1109\/ICIT52682.2021.9491734"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Backes, M., D\u00f6ttling, N., Hanzlik, L., Kluczniak, K., Schneider, J.: Ring signatures: logarithmic-size, no setup-from standard assumptions. In: EUROCRYPT 2019, pp. 281\u2013311. Springer (2019)","DOI":"10.1007\/978-3-030-17659-4_10"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: EUROCRYPT 2003, pp. 416\u2013432. Springer (2003)","DOI":"10.1007\/3-540-39200-9_26"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Chaum, D., Van\u00a0Heyst, E.: Group signatures. In: EUROCRYPT 1991, pp. 257\u2013265. Springer (1991)","DOI":"10.1007\/3-540-46416-6_22"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Chevignard, C., Fouque, P.A., Schrottenloher, A.: Reducing the number of qubits in quantum factoring. Cryptology ePrint Archive (2024)","DOI":"10.1007\/978-981-96-0944-4_10"},{"issue":"3","key":"12_CR7","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s00145-021-09388-x","volume":"34","author":"D Diemert","year":"2021","unstructured":"Diemert, D., Jager, T.: On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments. J. Cryptol. 34(3), 30 (2021)","journal-title":"J. Cryptol."},{"key":"12_CR8","first-page":"57","volume":"800","author":"B Elaine","year":"2016","unstructured":"Elaine, B., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for key management, part 1: General. NIST Spec. Publ. 800, 57 (2016)","journal-title":"NIST Spec. Publ."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Esgin, M.F., Steinfeld, R., Liu, J.K., Liu, D.: Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications. In: CRYPTO 2019, pp. 115\u2013146. Springer (2019)","DOI":"10.1007\/978-3-030-26948-7_5"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Esgin, M.F., Steinfeld, R., Sakzad, A., Liu, J.K., Liu, D.: Short lattice-based one-out-of-many proofs and applications to ring signatures. In: ACNS 2019, pp. 67\u201388. Springer (2019)","DOI":"10.1007\/978-3-030-21568-2_4"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Esgin, M.F., Steinfeld, R., Zhao, R.K.: MatRiCT+: more efficient post-quantum private blockchain payments. In: IEEE S &P 2022, pp. 1281\u20131298. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833655"},{"issue":"2","key":"12_CR12","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"issue":"1","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/iet-ifs.2014.0428","volume":"10","author":"C Gritti","year":"2016","unstructured":"Gritti, C., Susilo, W., Plantard, T.: Logarithmic size ring signatures without random oracles. IET Inf. Secur. 10(1), 1\u20137 (2016)","journal-title":"IET Inf. Secur."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Groth, J., Kohlweiss, M.: One-out-of-many proofs: or how to leak a secret and spend a coin. In: EUROCRYPT 2015, pp. 253\u2013280. Springer (2015)","DOI":"10.1007\/978-3-662-46803-6_9"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Herranz, J., S\u00e1ez, G.: Forking lemmas for ring signature schemes. In: INDOCRYPT 2003, pp. 266\u2013279. Springer (2003)","DOI":"10.1007\/978-3-540-24582-7_20"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10207-007-0021-2","volume":"7","author":"X Huang","year":"2008","unstructured":"Huang, X., Susilo, W., Mu, Y., Wu, W.: Secure universal designated verifier signature without random oracles. Int. J. Inf. Secur. 7, 171\u2013183 (2008)","journal-title":"Int. J. Inf. Secur."},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Jager, T., Kakvi, S.A., May, A.: On the security of the PKCS# 1 v1. 5 signature scheme. In: CCS 2018, pp. 1195\u20131208 (2018)","DOI":"10.1145\/3243734.3243798"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: EUROCRYPT 1996, pp. 143\u2013154. Springer (1996)","DOI":"10.1007\/3-540-68339-9_13"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Kaliski, B.: PKCS# 1: RSA encryption version 1.5. RFC 2313 (1998). https:\/\/www.rfc-editor.org\/rfc\/rfc2313.txt","DOI":"10.17487\/rfc2313"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Li, B., Liu, Y., Yang, S.: Lattice-based universal designated verifier signatures. In: ICEBE 2018, pp. 329\u2013334. IEEE (2018)","DOI":"10.1109\/ICEBE.2018.00062"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Li, Y., Susilo, W., Mu, Y., Pei, D.: Designated verifier signature: definition, framework and new constructions. In: UIC 2007, pp. 1191\u20131200. Springer (2007)","DOI":"10.1007\/978-3-540-73549-6_116"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Liu, X., Baek, J., Susilo, W.: Withdrawable signature: how to call off a signature. In: ISC 2023, pp. 557\u2013577. Springer (2023)","DOI":"10.1007\/978-3-031-49187-0_28"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V., Nguyen, N.K.: BLOOM: bimodal lattice one-out-of-many proofs and applications. In: ASIACRYPT 2022, pp. 95\u2013125. Springer (2023)","DOI":"10.1007\/978-3-031-22972-5_4"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Moriarty, K., Kaliski, B., Jonsson, J., Rusch, A.: PKCS# 1: RSA cryptography specifications version 2.2. RFC 8017 (Informational) (2016). https:\/\/www.rfc-editor.org\/rfc\/rfc8017.txt","DOI":"10.17487\/RFC8017"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Park, S., Sealfon, A.: It wasn\u2019t me! Repudiability and claimability of ring signatures. In: CRYPTO 2019, pp. 159\u2013190. Springer (2019)","DOI":"10.1007\/978-3-030-26954-8_6"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The transport layer security (TLS) protocol version 1.3 (2018). https:\/\/datatracker.ietf.org\/doc\/html\/rfc8446","DOI":"10.17487\/RFC8446"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: ASIACRYPT 2001, pp. 552\u2013565. Springer (2001)","DOI":"10.1007\/3-540-45682-1_32"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: FOCS 1994, pp. 124\u2013134. IEEE (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Steinfeld, R., Bull, L., Wang, H., Pieprzyk, J.: Universal designated-verifier signatures. In: ASIACRYPT 2003, pp. 523\u2013542. Springer (2003)","DOI":"10.1007\/978-3-540-40061-5_33"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Steinfeld, R., Wang, H., Pieprzyk, J.: Efficient extension of standard Schnorr\/RSA signatures into universal designated-verifier signatures. In: PKC 2004, pp. 86\u2013100. Springer (2004)","DOI":"10.1007\/978-3-540-24632-9_7"},{"issue":"8","key":"12_CR31","doi-asserted-by":"publisher","first-page":"18234","DOI":"10.3934\/math.2023927","volume":"8","author":"P Thanalakshmi","year":"2023","unstructured":"Thanalakshmi, P., Anbazhagan, N., Joshi, G.P., Yang, E.: A quantum resistant universal designated verifier signature proof. AIMS Math. 8(8), 18234\u201318250 (2023)","journal-title":"AIMS Math."},{"key":"12_CR32","doi-asserted-by":"publisher","first-page":"95019","DOI":"10.1109\/ACCESS.2020.2987336","volume":"8","author":"P Thorncharoensri","year":"2020","unstructured":"Thorncharoensri, P., Susilo, W., Baek, J.: Aggregatable certificateless designated verifier signature. IEEE Access 8, 95019\u201395031 (2020)","journal-title":"IEEE Access"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Tian, H., Chen, X., Li, J.: A short non-delegatable strong designated verifier signature. In: ACISP 2012, pp. 261\u2013279. Springer (2012)","DOI":"10.1007\/978-3-642-31448-3_20"},{"issue":"1","key":"12_CR34","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s11128-021-03387-4","volume":"21","author":"X Xin","year":"2022","unstructured":"Xin, X., Ding, L., Li, C., Sang, Y., Yang, Q., Li, F.: Quantum public-key designated verifier signature. Quantum Inf. Process. 21(1), 33 (2022)","journal-title":"Quantum Inf. Process."},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Yamashita, K., Hara, K., Watanabe, Y., Yanai, N., Shikata, J.: Designated verifier signature with claimability. In: APKC 2023, pp. 21\u201332 (2023)","DOI":"10.1145\/3591866.3593071"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, R., Furukawa, J., Imai, H.: Short signature and universal designated verifier signature without random oracles. In: ACNS 2005, pp. 483\u2013498. Springer (2005)","DOI":"10.1007\/11496137_33"}],"container-title":["Lecture Notes in Computer Science","Provable and Practical Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0954-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T17:51:00Z","timestamp":1738345860000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0954-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819609536","9789819609543"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0954-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ProvSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Provable Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"provsec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/provsec2024.github.io\/ProvSec2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}