{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:17:33Z","timestamp":1774721853588,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,9,21]],"date-time":"2015-09-21T00:00:00Z","timestamp":1442793600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s00145-015-9208-2","type":"journal-article","created":{"date-parts":[[2015,9,21]],"date-time":"2015-09-21T20:40:37Z","timestamp":1442868037000},"page":"729-774","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Unconditionally Anonymous Ring and Mesh Signatures"],"prefix":"10.1007","volume":"29","author":[{"given":"Xavier","family":"Boyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,9,21]]},"reference":[{"key":"9208_CR1","doi-asserted-by":"crossref","unstructured":"M. Abe, M. Ohkubo, K. Suzuki, \n                    \n                      \n                    \n                    $$1$$\n                    \n                      \n                        \n                          1\n                        \n                      \n                    \n                   signatures from a variety of keys, in Proceedings of AsiaCrypt 2002. LNCS, vol. 2501 (Springer, 2002), pp. 415\u2013432","DOI":"10.1007\/3-540-36178-2_26"},{"key":"9208_CR2","unstructured":"G. Ateniese, J. Camenisch, S. Hohenberger, B. de Medeiros, Practical group signatures without random oracles. Cryptology ePrint Archive, Report 2005\/385 (2005). \n                    http:\/\/eprint.iacr.org\/"},{"key":"9208_CR3","unstructured":"M.H. Au, J.K. Liu, T.H. Yuen, D.S. Wong, ID-based ring signature scheme secure in the standard model, in Proceedings of IWSEC 2006. LNCS, vol. 4266 (2006), pp. 1\u201316"},{"key":"9208_CR4","doi-asserted-by":"crossref","unstructured":"A. Bender, J. Katz, R. Morselli, Ring signatures: stronger definitions, and constructions without random oracles. J. Cryptol.\n                           22(1):114\u2013138 (2009)","DOI":"10.1007\/s00145-007-9011-9"},{"key":"9208_CR5","doi-asserted-by":"crossref","unstructured":"D. Boneh, X. Boyen, Short signatures without random oracles, in Advances in Cryptology\u2014EUROCRYPT 2004. LNCS, vol. 3027 (Springer, 2004), pp. 56\u201373","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"9208_CR6","doi-asserted-by":"crossref","unstructured":"D. Boneh, X. Boyen, Short signatures without random oracles and the SDH assumption in bilinear groups. J. Cryptol.\n                           21(2):149\u2013177 (2008)","DOI":"10.1007\/s00145-007-9005-7"},{"key":"9208_CR7","doi-asserted-by":"crossref","unstructured":"D. Boneh, X. Boyen, H. Shacham, Short group signatures, in Advances in Cryptology\u2014CRYPTO 2004. LNCS, vol. 3152 (Springer, 2004), pp. 41\u201355","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"9208_CR8","doi-asserted-by":"crossref","unstructured":"D. Boneh, C. Gentry, B. Lynn, H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in Advances in Cryptology\u2014EUROCRYPT 2003. LNCS, vol. 2656 (Springer, 2003), pp. 416\u2013432","DOI":"10.1007\/3-540-39200-9_26"},{"key":"9208_CR9","doi-asserted-by":"crossref","unstructured":"D. Boneh, E.-J. Goh, K. Nissim, Evaluating 2-DNF formulas on ciphertexts, in Proceedings of TCC 2005, Lecture Notes in Computer Science (Springer, 2005)","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"9208_CR10","doi-asserted-by":"crossref","unstructured":"X. Boyen, Mesh signatures: how to leak a secret with unwitting and unwilling participants, in Advances in Cryptology\u2014EUROCRYPT 2007. LNCS, vol. 4515 (Springer-Verlag, 2007), pp. 210\u2013227","DOI":"10.1007\/978-3-540-72540-4_12"},{"key":"9208_CR11","doi-asserted-by":"crossref","unstructured":"X. Boyen, B. Waters, Full-domain subgroup hiding and constant-size group signatures, in Public Key Cryptography\u2014PKC 2007. LNCS, vol. 4450 (Springer, 2007), pp. 1\u201315","DOI":"10.1007\/978-3-540-71677-8_1"},{"key":"9208_CR12","unstructured":"E. Bresson, J. Stern, M. Szydlo, Threshold ring signatures and applications to ad-hoc groups, in Advances in Cryptology\u2014CRYPTO 2002. LNCS, vol. 2442 (2002), pp. 465\u2013480"},{"key":"9208_CR13","doi-asserted-by":"crossref","unstructured":"J. Camenisch, A. Lysyanskaya, Signature schemes with efficient protocols, in Proceedings of SCN 2002. LNCS (Springer, 2002)","DOI":"10.1007\/3-540-36413-7_20"},{"key":"9208_CR14","doi-asserted-by":"crossref","unstructured":"J. Camenisch, A. Lysyanskaya, Signature schemes and anonymous credentials from bilinear maps, in Advances in Cryptology\u2014CRYPTO 2004. LNCS, vol. 3152 (Springer, 2004)","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"9208_CR15","unstructured":"N. Chandran, J. Groth, A. Sahai, Ring signatures of sub-linear size without random oracles, in Proceedings of ICALP 2007, vol. 4596 (2007), pp. 423\u2013443."},{"key":"9208_CR16","doi-asserted-by":"crossref","unstructured":"M. Chase, A. Lysyanskaya, Signatures of knowledge, in Advances in Cryptology\u2014CRYPTO 2006. LNCS, vol. 4117 (Springer, 2006)","DOI":"10.1007\/11818175_5"},{"key":"9208_CR17","doi-asserted-by":"crossref","unstructured":"D. Chaum, E. van Heyst, Group signatures, in Advances in Cryptology\u2014EUROCRYPT 1991. LNCS, vol. 547 (Springer, 1991), pp. 257\u2013265","DOI":"10.1007\/3-540-46416-6_22"},{"key":"9208_CR18","doi-asserted-by":"crossref","unstructured":"J.H. Cheon, Security analysis of the strong Diffie\u2013Hellman problem, in Advances in Cryptology\u2014EUROCRYPT 2006. LNCS, vo. 4004 (Springer, 2006), pp. 1\u201313","DOI":"10.1007\/11761679_1"},{"key":"9208_CR19","unstructured":"S.S.M. Chow, L.C.K. Hui, S.-M. Yiu. Identity based threshold ring signature, in Proceedings of ICISC 2004. LNCS, vol. 3506 (2004), pp. 218\u2013232"},{"key":"9208_CR20","unstructured":"S.S.M. Chow, R.W.C. Lui, L.C.K. Hui, S.-M. Yiu, Identity based ring signature: why, how and what next, in Proceedings of EuroPKI 2005. LNCS, vol. 3545 (2005), pp. 144\u2013161"},{"key":"9208_CR21","doi-asserted-by":"crossref","unstructured":"S.S.M. Chow, V.K.-W. Wei, J.K. Liu, T.H. Yuen, Ring signatures without random oracles, in Proceedings of AsiaCCS 2006 (ACM Press, 2006), pp. 297\u2013302","DOI":"10.1145\/1128817.1128861"},{"key":"9208_CR22","unstructured":"S.S.M. Chow, S.-M. Yiu, L.C.K. Hui, Efficient identity based ring signature, in Proceedings of ACNS 2005. LNCS, vol. 3531 (2005) pp. 499\u2013512"},{"key":"9208_CR23","doi-asserted-by":"crossref","unstructured":"R. Cramer, I. Damg\u00e5rd, B. Schoenmakers, Proofs of partial knowledge and simplified design of witness hiding protocols, in Advances in Cryptology\u2014CRYPTO 1994. LNCS, vol. 839 (Springer, 1994), pp. 174\u2013187","DOI":"10.1007\/3-540-48658-5_19"},{"key":"9208_CR24","unstructured":"Y. Dodis, A. Kiayias, A. Nicolosi, V. Shoup, Anonymous identification in ad hoc groups, in Advances in Cryptology\u2014EUROCRYPT 2004. LNCS, vol. 3027 (Springer, 2004), pp. 609\u2013626."},{"key":"9208_CR25","doi-asserted-by":"crossref","unstructured":"C. Dwork, M. Naor, Zaps and their applications. SIAM J. Comput.\n                           36(6):1513\u20131543 (2007)","DOI":"10.1137\/S0097539703426817"},{"key":"9208_CR26","doi-asserted-by":"crossref","unstructured":"C. Dwork, M. Naor, A. Sahai, Concurrent zero-knowledge or the timing model for designing concurrent protocols. J. ACM\n                           51(6):851\u2013898 (2004)","DOI":"10.1145\/1039488.1039489"},{"key":"9208_CR27","unstructured":"A.L. Ferrara, M. Green, S. Hohenberger, M.O. Pedersen, Practical short signature batch verification. Cryptology ePrint Archive, Report 2008\/015 (2008). \n                    http:\/\/eprint.iacr.org\/"},{"key":"9208_CR28","unstructured":"S.D. Galbraith, K.G. Paterson, N.P. Smart, Pairings for cryptographers. Cryptology ePrint Archive, Report 2006\/165 (2006). \n                    http:\/\/eprint.iacr.org\/"},{"key":"9208_CR29","unstructured":"J. Groth, Fully anonymous group signatures without random oracles, in Proceedings of ASIACRYPT 2007. LNCS, vol. 4833 (2007), pp. 164\u2013180"},{"key":"9208_CR30","doi-asserted-by":"crossref","unstructured":"J. Groth, R. Ostrovsky, A. Sahai, Non-interactive Zaps and new techniques for NIZK, in Advances in Cryptology\u2014CRYPTO 2006. LNCS (Springer, 2006)","DOI":"10.1007\/11818175_6"},{"key":"9208_CR31","doi-asserted-by":"crossref","unstructured":"J. Herranz, G. S\u00e1ez, Forking lemmas for ring signature schemes, in Proceedings of IndoCrypt 2003. LNCS, vol. 2904 (Springer, 2003), pp. 266\u2013279","DOI":"10.1007\/978-3-540-24582-7_20"},{"key":"9208_CR32","unstructured":"J. Herranz, G. S\u00e1ez, New distributed ring signatures for general families of signing subsets. Cryptology ePrint Archive, Report 2004\/377 (2004). \n                    http:\/\/eprint.iacr.org\/"},{"key":"9208_CR33","doi-asserted-by":"crossref","unstructured":"A. Joux, K. Nguyen, Separating decision Diffie\u2013Hellman from computational Diffie\u2013Hellman in cryptographic groups. J. Cryptol., 16(4) (2003)","DOI":"10.1007\/s00145-003-0052-4"},{"key":"9208_CR34","unstructured":"M. Karchmer, A. Wigderson, On span programs, in Annual Conference on Structure in Complexity Theory (1993)"},{"key":"9208_CR35","doi-asserted-by":"crossref","unstructured":"V. Miller, The Weil pairing, and its efficient calculation. J. Cryptol.\n                           17(4) (2004)","DOI":"10.1007\/s00145-004-0315-8"},{"key":"9208_CR36","doi-asserted-by":"crossref","unstructured":"M. Naor, Deniable ring authentication, in Advances in Cryptology\u2014CRYPTO 2002. LNCS, vol. 2442 (Springer, 2002), pp. 481\u2013498","DOI":"10.1007\/3-540-45708-9_31"},{"key":"9208_CR37","doi-asserted-by":"crossref","unstructured":"R. Rivest, A. Shamir, Y. Tauman, How to leak a secret, in Proceedings of AsiaCrypt 2001. LNCS, vol. 2248 (Springer, 2001), pp. 552\u2013565","DOI":"10.1007\/3-540-45682-1_32"},{"key":"9208_CR38","unstructured":"H. Shacham, B. Waters, Efficient ring signatures without random oracles, in Public Key Cryptography\u2014PKC 2007. LNCS, vol. 4450 (Springer, 2007)"},{"key":"9208_CR39","doi-asserted-by":"crossref","unstructured":"V. Shoup, Lower bounds for discrete logarithms and related problems, in Advances in Cryptology\u2014EUROCRYPT 1997. LNCS, vol. 1233 (Springer, 1997)","DOI":"10.1007\/3-540-69053-0_18"},{"key":"9208_CR40","doi-asserted-by":"crossref","unstructured":"M. van Dijk, A linear construction of secret sharing schemes. Des. Codes Cryptogr.\n                           12(2):161\u2013201 (1997)","DOI":"10.1023\/A:1008259214236"},{"key":"9208_CR41","doi-asserted-by":"crossref","unstructured":"B. Waters, Efficient identity-based encryption without random oracles, in Advances in Cryptology\u2014EUROCRYPT 2005. LNCS, vol. 3494 (Springer, 2005)","DOI":"10.1007\/11426639_7"},{"key":"9208_CR42","unstructured":"V.K. Wei, T.H. Yuen, (Hierarchical identity-based) threshold ring signatures. Cryptology ePrint Archive, Report 2006\/193 (2006). \n                    http:\/\/eprint.iacr.org\/"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9208-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-015-9208-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9208-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9208-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T08:11:44Z","timestamp":1586333504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-015-9208-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,21]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["9208"],"URL":"https:\/\/doi.org\/10.1007\/s00145-015-9208-2","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,21]]},"assertion":[{"value":"2 July 2008","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2015","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}