{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:08:01Z","timestamp":1769720881656,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,7,8]],"date-time":"2015-07-08T00:00:00Z","timestamp":1436313600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s00145-015-9211-7","type":"journal-article","created":{"date-parts":[[2015,7,7]],"date-time":"2015-07-07T20:27:53Z","timestamp":1436300873000},"page":"833-878","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions"],"prefix":"10.1007","volume":"29","author":[{"given":"Masayuki","family":"Abe","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Melissa","family":"Chase","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bernardo","family":"David","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Markulf","family":"Kohlweiss","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ryo","family":"Nishimaki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Miyako","family":"Ohkubo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,7,8]]},"reference":[{"key":"9211_CR1","doi-asserted-by":"crossref","unstructured":"M. Abe, J. Camenisch, M. Dubovitskaya, R. Nishimaki, Universally composable adaptive oblivious transfer (with access control) from standard assumptions, in DIM\u201913, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Berlin, Germany (ACM, 2013), pp. 1\u201312","DOI":"10.1145\/2517881.2517883"},{"key":"9211_CR2","doi-asserted-by":"crossref","unstructured":"M. Abe, M. Chase, B. David, M. Kohlweiss, R. Nishimaki, M. Ohkubo, Constant-size structure-preserving signatures generic constructions and simple assumptions, in Advances in Cryptology\u2014ASIACRYPT 2012, volume 7658 of LNCS, ed. by X. Wang, K. Sako (Springer, Berlin, 2012), pp. 4\u201312,","DOI":"10.1007\/978-3-642-34961-4_3"},{"key":"9211_CR3","doi-asserted-by":"crossref","unstructured":"M. Abe, B. David, M. Kohlweiss, R. Nishimaki, M. Ohkubo, Tagged one-time signatures: tight security and optimal tag size, in Public-Key Cryptology\u2014PKC 2013, volume 7778 of LNCS, ed. by K. Kurosawa, G. Hanaoka (Springer, Berlin, 2013), pp. 312\u2013331","DOI":"10.1007\/978-3-642-36362-7_20"},{"key":"9211_CR4","doi-asserted-by":"publisher","unstructured":"M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, M. Ohkubo, Structure-preserving signatures and commitments to group elements. J. Cryptol., (2015). doi: 10.1007\/s00145-014-9196-7","DOI":"10.1007\/s00145-014-9196-7"},{"key":"9211_CR5","doi-asserted-by":"crossref","unstructured":"M. Abe, J. Groth, K. Haralambiev, M. Ohkubo, Optimal structure-preserving signatures in asymmetric bilinear groups, in Advances in Cryptology\u2014CRYPTO \u201911. LNCS (Springer, Berlin, 2011)","DOI":"10.1007\/978-3-642-22792-9_37"},{"key":"9211_CR6","doi-asserted-by":"crossref","unstructured":"M. Abe, J. Groth, M. Ohkubo, Separating short structure preserving signatures from non-interactive assumptions, in Advances in Cryptology\u2014ASIACRYPT 2011, volume 7073 of LNCS, ed. by D. H. Lee, X. Wang (Springer, Berlin, 2011), pp. 628\u2013646","DOI":"10.1007\/978-3-642-25385-0_34"},{"key":"9211_CR7","unstructured":"M. Abe, K. Haralambiev, M. Ohkubo, Signing on group elements for modular protocol designs. IACR ePrint Archive, Report 2010\/133, 2010. http:\/\/eprint.iacr.org"},{"issue":"3","key":"9211_CR8","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1504\/IJACT.2012.045581","volume":"2","author":"M Abe","year":"2012","unstructured":"M. Abe, M. Ohkubo, A framework for universally composable non-committing blind signatures. IJACT, 2(3), 229\u2013249 (2012).","journal-title":"IJACT"},{"key":"9211_CR9","doi-asserted-by":"crossref","unstructured":"M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, H. Shacham, Randomizable proofs and delegatable anonymous credentials, in Advances in Cryptology\u2014CRYPTO 2009, volume 5677 of LNCS, ed. by S. Halevi (Springer, Berlin, 2009), pp. 108\u2013125","DOI":"10.1007\/978-3-642-03356-8_7"},{"key":"9211_CR10","doi-asserted-by":"crossref","unstructured":"M. Bellare, D. Micciancio, B. Warinschi, Foundations of group signatures: Formal definitions, simplified requirements and a construction based on general assumptions, in Advances in Cryptology\u2014EUROCRYPT 2013, volume 2656 of LNCS, ed. by E. Biham (Springer, Berlin, 2003), pp. 614\u2013629","DOI":"10.1007\/3-540-39200-9_38"},{"key":"9211_CR11","doi-asserted-by":"crossref","unstructured":"M. Bellare, H. Shi, C. Zhang, Foundations of group signatures: the case of dynamic groups, in Topics in Cryptology\u2014CT-RSA 2005, volume 3376 of LNCS, ed. by A. Menezes (Springer, Berlin, 2005), pp. 136\u2013154. Full version available at IACR e-print 2004\/077","DOI":"10.1007\/978-3-540-30574-3_11"},{"key":"9211_CR12","doi-asserted-by":"crossref","unstructured":"M. Bellare, S. Shoup, Two-tier signatures, strongly unforgeable signatures, and Fiat\u2013Shamir without random oracles, in Public-Key Cryptology\u2014PKC 2007, volume 4450 of LNCS, ed. by T. Okamoto, X. Wang (Springer, Berlin, 2007), pp. 201\u2013216","DOI":"10.1007\/978-3-540-71677-8_14"},{"key":"9211_CR13","doi-asserted-by":"crossref","unstructured":"D. Boneh, X. Boyen, H. Shacham, Short group signatures, in Advances in Cryptology\u2014CRYPTO 2004, volume 3152 of LNCS, ed. by M. Franklin (Springer, Berlin, 2004), pp. 41\u201355","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"9211_CR14","doi-asserted-by":"crossref","unstructured":"D. Boneh, C. Gentry, B. Lynn, H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in Advances in Cryptology\u2014EUROCRYPT 2003, volume 2656 of LNCS, ed. by E. Biham (Springer, Berlin, 2003), pp. 416\u2013432","DOI":"10.1007\/3-540-39200-9_26"},{"key":"9211_CR15","doi-asserted-by":"crossref","unstructured":"J. Camenisch, M. Dubovitskaya, K. Haralambiev, Efficient structure-preserving signature scheme from standard assumptions, in Security and Cryptography for Networks\u2014SCN 2012, volume 7485 of LNCS, ed. by I. Visconti, R. De Prisco (Springer, Berlin, 2012), pp. 76\u201394","DOI":"10.1007\/978-3-642-32928-9_5"},{"key":"9211_CR16","unstructured":"J. Cathalo, B. Libert, M. Yung, Group encryption: Non-interactive realization in the standard model, in Advances in Cryptology\u2014ASIACRYPT 2009, volume 5912 of LNCS, ed. by M. Matsui (2009), pp. 179\u2013196"},{"key":"9211_CR17","doi-asserted-by":"crossref","unstructured":"M. Chase, M. Kohlweiss, A new hash-and-sign approach and structure-preserving signatures from DLIN, in Security and Cryptography for Networks-SCN 2012, volume 7485 of LNCS, ed. by I. Visconti, R. De Prisco (Springer, Berlin, 2012), pp. 131\u2013148","DOI":"10.1007\/978-3-642-32928-9_8"},{"key":"9211_CR18","doi-asserted-by":"crossref","unstructured":"M. Chase, M. Kohlweiss, A. Lysyanskaya, S. Meiklejohn, Malleable proof systems and applications, in Advances in Cryptology\u2014EUROCRYPT 2012, volume 7237 of LNCS, ed. by D. Pointcheval, T. Johansson (Springer, Berlin, 2012), pp. 281\u2013300","DOI":"10.1007\/978-3-642-29011-4_18"},{"issue":"3","key":"9211_CR19","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1007\/s10623-013-9834-3","volume":"73","author":"J Chen","year":"2014","unstructured":"J. Chen, H. W. Lim, S. Ling, H. Wang, H. Wee, Shorter identity-based encryption via asymmetric pairings. Des. Codes Cryptogr., 73(3), 911\u2013947 (2014)","journal-title":"Des. Codes Cryptogr."},{"issue":"2","key":"9211_CR20","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1137\/S0097539795291562","volume":"30","author":"D Dolev","year":"2000","unstructured":"D. Dolev, C. Dwork, M. Naor, Nonmalleable cryptography. SIAM J. Comput., 30(2), 391\u2013437 (2000).","journal-title":"SIAM J. Comput."},{"issue":"3","key":"9211_CR21","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s001459900043","volume":"11","author":"C Dwork","year":"1998","unstructured":"C. Dwork, M. Naor, An efficient existentially unforgeable signature scheme and its applications. J. Cryptol., 11(3), 187\u2013208 (1998)","journal-title":"J. Cryptol."},{"issue":"1","key":"9211_CR22","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/BF02254791","volume":"9","author":"S Even","year":"1996","unstructured":"S. Even, O. Goldreich, S. Micali, On-line\/off-line digital signatures. J. Cryptol., 9(1), 35\u201367 (1996)","journal-title":"J. Cryptol."},{"key":"9211_CR23","doi-asserted-by":"crossref","unstructured":"M. Fischlin, Round-optimal composable blind signatures in the common reference model, in Advances in Cryptology\u2014CRYPTO 2006, volume 4117 of LNCS, ed. by C. Dwork (Springer, Berlin, 2006), pp. 60\u201377","DOI":"10.1007\/11818175_4"},{"key":"9211_CR24","doi-asserted-by":"crossref","unstructured":"G. Fuchsbauer, Commuting signatures and verifiable encryption, in Advances in Cryptology\u2014EUROCRYPT 2011, volume 6632 of LNCS, ed. by K. G. Paterson (Springer, Berlin, 2011), pp. 224\u2013245","DOI":"10.1007\/978-3-642-20465-4_14"},{"key":"9211_CR25","doi-asserted-by":"crossref","unstructured":"G. Fuchsbauer, D. Pointcheval, Anonymous proxy signatures, in Security and Cryptography for Networks\u2014SCN 2008, volume 5229 of LNCS, ed. by R. Ostrovsky, R. De Prisco, I. Visconti (Springer, Berlin, 2008), pp. 201\u2013217","DOI":"10.1007\/978-3-540-85855-3_14"},{"key":"9211_CR26","doi-asserted-by":"crossref","unstructured":"G. Fuchsbauer, D. Pointcheval, D. Vergnaud, Transferable constant-size fair e-cash, in Cryptology and Network Security\u2014CANS 2009, volume 5888 of LNCS, ed. by J.A. Garay, A. Miyaji, A. Otsuka (Springer, Berlin, 2009), pp. 226\u2013247","DOI":"10.1007\/978-3-642-10433-6_15"},{"key":"9211_CR27","doi-asserted-by":"crossref","unstructured":"G. Fuchsbauer, D. Vergnaud, Fair blind signatures without random oracles, in Progress in Cryptology\u2014AFRICACRYPT 2010, volume 6055 of LNCS, ed.by D. J. Bernstein, T. Lange (Springer, Berlin, 2010), pp. 16\u201333","DOI":"10.1007\/978-3-642-12678-9_2"},{"issue":"16","key":"9211_CR28","doi-asserted-by":"publisher","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","volume":"156","author":"SD Galbraith","year":"2008","unstructured":"S.D. Galbraith, K.G. Peterson, N.P. Smart, Pairings for cryptographers. Discrete Appl. Math., 156(16), 3113\u20133121 (2008)","journal-title":"Discrete Appl. Math."},{"issue":"2","key":"9211_CR29","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali, R. Rivest, A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"9211_CR30","doi-asserted-by":"crossref","unstructured":"M. Green, S. Hohenberger, Universally composable adaptive oblivious transfer, in Advances in Cryptology\u2014ASIACRYPT 2008, volume 5350 of LNCS, ed. by J. Pieprzyk (Springer, Berlin, 2008), pp. 179\u2013197","DOI":"10.1007\/978-3-540-89255-7_12"},{"key":"9211_CR31","doi-asserted-by":"crossref","unstructured":"M. Green, S. Hohenberger, Practical adaptive oblivious transfer from simple assumptions, in Theory of Cryptography\u2014TCC 2011, volume 6597 of LNCS, ed. by Y. Ishai (Springer, Berlin, 2011), pp. 347\u2013363","DOI":"10.1007\/978-3-642-19571-6_21"},{"key":"9211_CR32","doi-asserted-by":"crossref","unstructured":"J. Groth, Simulation-sound NIZK proofs for a practical language and constant size group signatures, in Advances in Cryptology\u2014ASIACRYPT 2006, volume 4284 of LNCS, ed. by X. Lai, K. Chen (Springer, Berlin, 2006), pp. 444\u2013459","DOI":"10.1007\/11935230_29"},{"issue":"5","key":"9211_CR33","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1137\/080725386","volume":"41","author":"J Groth","year":"2012","unstructured":"J. Groth, A. Sahai, Efficient noninteractive proof systems for bilinear groups. SIAM J. Comput., 41(5), 1193\u20131232 (2012).","journal-title":"SIAM J. Comput."},{"key":"9211_CR34","doi-asserted-by":"crossref","unstructured":"D. Hofheinz, T. Jager, Tightly secure signatures and public-key encryption, in Advances in Cryptology\u2014CRYPTO 2012, volume 7417 of LNCS, ed. by R. Naini, R. Canetti (Springer, Berlin, 2012), pp. 590\u2013607","DOI":"10.1007\/978-3-642-32009-5_35"},{"key":"9211_CR35","doi-asserted-by":"crossref","unstructured":"A. Kiayias, M. Yung, Group signatures with efficient concurrent join, in Advances in Cryptology\u2014EUROCRYPT 2005, volume 3494 of LNCS, ed. by R. Cramer (Springer, Berlin, 2005), pp. 198\u2013214","DOI":"10.1007\/11426639_12"},{"key":"9211_CR36","doi-asserted-by":"crossref","unstructured":"B. Libert, T. Peters, M. Yung, Scalable group signatures with revocation, in Advances in Cryptology\u2014EUROCRYPT 2012, volume 7237 of LNCS, ed. by D. Pointcheval, T. Johansson (Springer,Berlin, 2012), pp. 609\u2013627","DOI":"10.1007\/978-3-642-29011-4_36"},{"issue":"3","key":"9211_CR37","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s00145-005-0345-x","volume":"19","author":"Y Lindell","year":"2006","unstructured":"Y. Lindell, A simpler construction of CCA2-secure public-key encryption under general assumptions. J. Cryptol., 19(3), 359\u2013377 (2006)","journal-title":"J. Cryptol."},{"key":"9211_CR38","doi-asserted-by":"crossref","unstructured":"M. Naor, M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks, in Symposium on Theory of Computing(STOC) 1990, ed. by H. Ortiz (ACM, NY, 1990), pp. 427\u2013437","DOI":"10.1145\/100216.100273"},{"key":"9211_CR39","doi-asserted-by":"crossref","unstructured":"M. R\u00fcckert, D. Schr\u00f6der, Security of verifiably encrypted signatures and a construction without random oracles, in Pairing-Based Cryptography\u2014Pairing 2009, volume 5671 of LNCS, ed. by H. Shacham, B. Waters (Springer, Berlin, 2009), pp. 17\u201334","DOI":"10.1007\/978-3-642-03298-1_2"},{"key":"9211_CR40","doi-asserted-by":"crossref","unstructured":"A. Sahai, Non-malleable non-interactive zero-knowledge and chosen-ciphertext security, in Foundations of Computer Science(FOCS) 1999 (IEEE Computer Society, Washington, DC, 1999) pp. 543\u2013553","DOI":"10.1109\/SFFCS.1999.814628"},{"key":"9211_CR41","doi-asserted-by":"crossref","unstructured":"A. De Santis, G. Di Crescenzo, R. Ostrovsky, G. Persiano, A. Sahai. Robust non-interactive zero knowledge. in Advances in Cryptology\u2014CRYPTO 2001, volume 2139 of LNCS, ed. by J. Kilian (Springer, Berlin, 2001), pp. 566\u2013598","DOI":"10.1007\/3-540-44647-8_33"},{"key":"9211_CR42","doi-asserted-by":"crossref","unstructured":"A. Shamir, Y. Tauman, Improved online\/offline signature schemes, in Advances in Cryptology\u2014CRYPTO 2001, volume 2139 of LNCS, ed. by J. Kilian (Springer, Berlin, 2001), pp. 355\u2013367","DOI":"10.1007\/3-540-44647-8_21"},{"key":"9211_CR43","doi-asserted-by":"crossref","unstructured":"V. Shoup, Lower bounds for discrete logarithms and related problems, in Advances in Cryptology\u2014EUROCRYPT 1997, volume 1233 of LNCS, ed. by W. Fumy (Springer, Berlin, 1997), pp. 256\u2013266","DOI":"10.1007\/3-540-69053-0_18"},{"key":"9211_CR44","doi-asserted-by":"crossref","unstructured":"B. Waters, Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions, in Advances in Cryptology\u2014CRYPTO 2009, volume 5677 of LNCS, ed. by S. Halevi (Springer, Berlin, 2009), pp. 619\u2013636","DOI":"10.1007\/978-3-642-03356-8_36"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9211-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-015-9211-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9211-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-015-9211-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T02:27:58Z","timestamp":1748485678000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-015-9211-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,8]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["9211"],"URL":"https:\/\/doi.org\/10.1007\/s00145-015-9211-7","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,8]]},"assertion":[{"value":"26 January 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2015","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}