{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T15:21:03Z","timestamp":1758122463922,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819750245"},{"type":"electronic","value":"9789819750252"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5025-2_20","type":"book-chapter","created":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T04:01:54Z","timestamp":1721016114000},"page":"389-407","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Threshold Signatures with\u00a0Private Accountability via\u00a0Secretly Designated Witnesses"],"prefix":"10.1007","author":[{"given":"Meng","family":"Li","sequence":"first","affiliation":[]},{"given":"Hanni","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zijian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,16]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Proceedings of 6th Annual International Cryptology Conference (CRYPTO), pp. 307\u2013315. Santa Barbara, USA (1989)","DOI":"10.1007\/0-387-34805-0_28"},{"key":"20_CR2","unstructured":"Shoup, V.: Practical threshold signatures. In: International Conference on the Theory and Application of Cryptographic Techniques(EUROCRYPT), pp. 14\u201318. Bruges, Belgium (2000)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Fouque, P., Stern, J.: Fully distributed threshold RSA under standard assumptions. International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT), pp. 310\u2013330. Gold Coast, Australia (2001)","DOI":"10.1007\/3-540-45682-1_19"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Koprowski, M.: Practical threshold RSA signatures without a trusted dealer. In: International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT), pp. 152\u2013165. Innsbruck, Austria (2001)","DOI":"10.1007\/3-540-44987-6_10"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Micali, S., Ohta, K., Reyzin, L.: Accountable-subgroup multi signatures: extended abstract. In: Proceedings of 8th ACM Conference on Computer and Communications Security (CCS), pp. 245\u2013254. Philadelphia, USA (2001)","DOI":"10.1145\/501983.502017"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Proceedings of 7th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), pp. 514\u2013532. Gold Coast, Australia (2001)","DOI":"10.1007\/3-540-45682-1_30"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Proceedings of 13th ACM Conference on Computer and Communications Security (CCS), pp. 390\u2013399. Alexandria, USA (2006)","DOI":"10.1145\/1180405.1180453"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Nick, J., Ruffing, T., Seurin, Y.: MuSig2: simple two-round Schnorr multi-signatures. In: Proceedings of 41st Annual International Cryptology Conference (CRYPTO), pp. 189\u2013221, Virtual (2021)","DOI":"10.1007\/978-3-030-84242-0_8"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Tang, G.: On tightly-secure (linkable) ring signatures. In: Proceedings of 23rd International Conference on Information and Communications Security (ICICS), pp. 375\u2013393. Chongqing, China (2021)","DOI":"10.1007\/978-3-030-88052-1_22"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Ji, Y., Tao, Y., Rui, Z.: More efficient construction of anonymous signatures. In: Proceedings of 23rd International Conference on Information and Communications Security (ICICS), pp. 394\u2013411. Chongqing, China (2021)","DOI":"10.1007\/978-3-030-88052-1_23"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Goyal, V., Song, Y., Srinivasan, A.: Traceable secret sharing and applications. In: Proceedings of 41st Annual International Cryptology Conference (CRYPTO), pp. 718\u2013747, Virtual (2021)","DOI":"10.1007\/978-3-030-84252-9_24"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Boneh, D., Komlo, C.: Threshold signatures with private accountability. In: Proceedings of 42nd Annual International Cryptology Conference (CRYPTO), pp. 551\u2013581. Santa Barbara, USA (2022)","DOI":"10.1007\/978-3-031-15985-5_19"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e, C., Pointcheval, D.: Dynamic threshold public-key encryption. In: Proceedings of 28th Annual International Cryptology Conference (CRYPTO), pp. 317\u2013334. Santa Barbara, USA (2008)","DOI":"10.1007\/978-3-540-85174-5_18"},{"issue":"2","key":"20_CR14","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attack. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Loh, J.-C., Guo, F., Susilo, W., Yang, G.: A tightly secure ID-based signature scheme under DL assumption in AGM. In: Proceedings of 28th Australasian Conference on Information Security and Privacy (ACISP), pp. 199\u2013219. Brisbane, Australia (2023)","DOI":"10.1007\/978-3-031-35486-1_10"},{"issue":"1","key":"20_CR16","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1006\/inco.2000.2881","volume":"164","author":"R Gennaro","year":"2001","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Robust threshold DSS signatures. Inf. Comput. 164(1), 54\u201384 (2001)","journal-title":"Inf. Comput."},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography (Third edition), pp. 1\u2013598. CRC Press (2021)","DOI":"10.1201\/9781351133036-2"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Hierarchical identity based encryption with constant size ciphertext. Proceedings of 24th International Conference on the Theory and Application of Cryptographic Technique (EUROCRYPT), pp. 440\u2013456 (2005)","DOI":"10.1007\/11426639_26"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9, C., Paillier, P., Pointcheval, D.: Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Proceedings of first International Conference on Pairing-Based Cryptography (Pairing), pp. 39\u201359 (2007)","DOI":"10.1007\/978-3-540-73489-5_4"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5025-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T04:03:51Z","timestamp":1721016231000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5025-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819750245","9789819750252"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5025-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"16 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACISP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Conference on Information Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acisp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.acisp24.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}