{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:49:53Z","timestamp":1769719793526,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T00:00:00Z","timestamp":1476230400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s00145-016-9243-7","type":"journal-article","created":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T16:57:21Z","timestamp":1476291441000},"page":"1116-1156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces"],"prefix":"10.1007","volume":"30","author":[{"given":"Charanjit S.","family":"Jutla","sequence":"first","affiliation":[]},{"given":"Arnab","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,12]]},"reference":[{"key":"9243_CR1","doi-asserted-by":"crossref","unstructured":"M. Abdalla, F. Benhamouda, D. Pointcheval, Disjunctions for hash proof systems: new constructions and applications, in E. Oswald, M. Fischlin, editors, Advances in Cryptology\u2014EUROCRYPT\u00a02015, Part II, volume 9057 of Lecture Notes in Computer Science, Sofia, Bulgaria, April\u00a026\u201330, 2015 (Springer, Heidelberg, Germany, 2015), pp. 69\u2013100","DOI":"10.1007\/978-3-662-46803-6_3"},{"key":"9243_CR2","doi-asserted-by":"crossref","unstructured":"M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, M. Ohkubo, Structure-preserving signatures and commitments to group elements, in T. Rabin, editor, Advances in Cryptology\u2014CRYPTO\u00a02010, volume 6223 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August\u00a015\u201319, 2010 (Springer, Heidelberg, Germany, 2010), pp. 209\u2013236","DOI":"10.1007\/978-3-642-14623-7_12"},{"key":"9243_CR3","doi-asserted-by":"crossref","unstructured":"D. Boneh, X. Boyen, H. Shacham, Short group signatures, in M. Franklin, editor, Advances in Cryptology\u2014CRYPTO\u00a02004, volume 3152 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August\u00a015\u201319, 2004 (Springer, Heidelberg, Germany, 2004), pp. 41\u201355","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"9243_CR4","doi-asserted-by":"crossref","unstructured":"M. Bellare, A. Desai, D. Pointcheval, P. Rogaway, Relations among notions of security for public-key encryption schemes, in H. Krawczyk, editor, Advances in Cryptology\u2014CRYPTO\u201998, volume 1462 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August\u00a023\u201327, 1998 (Springer, Heidelberg, Germany, 1998), pp. 26\u201345","DOI":"10.1007\/BFb0055718"},{"key":"9243_CR5","doi-asserted-by":"crossref","unstructured":"M. Blum, P. Feldman, S. Micali, Non-interactive zero-knowledge and its applications (extended abstract), in 20th Annual ACM Symposium on Theory of Computing, Chicago, Illinois, USA, May\u00a02\u20134, 1988 (ACM Press, 1988), pp. 103\u2013112","DOI":"10.1145\/62212.62222"},{"key":"9243_CR6","doi-asserted-by":"crossref","unstructured":"M. Bellare, S. Goldwasser, New paradigms for digital signatures and message authentication based on non-interative zero knowledge proofs, in G. Brassard, editor, Advances in Cryptology\u2014CRYPTO\u201989, volume 435 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August\u00a020\u201324, 1990 (Springer, Heidelberg, Germany, 1990), pp. 194\u2013211","DOI":"10.1007\/0-387-34805-0_19"},{"key":"9243_CR7","unstructured":"M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in V.\u00a0Ashby, editor, ACM CCS 93: 1st Conference on Computer and Communications Security, Fairfax, Virginia, USA, November\u00a03\u20135, 1993 (ACM Press, 1993), pp. 62\u201373"},{"key":"9243_CR8","doi-asserted-by":"crossref","unstructured":"R. Canetti, Universally composable security: a new paradigm for cryptographic protocols, in 42nd Annual Symposium on Foundations of Computer Science, Las Vegas, Nevada, USA, October\u00a014\u201317, 2001 (IEEE Computer Society Press, 2001), pp. 136\u2013145","DOI":"10.1109\/SFCS.2001.959888"},{"key":"9243_CR9","doi-asserted-by":"crossref","unstructured":"J. Camenisch, N. Chandran, V. Shoup, A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks, in Antoine Joux, editor, Advances in Cryptology\u2014EUROCRYPT\u00a02009, volume 5479 of Lecture Notes in Computer Science, Cologne, Germany, April\u00a026\u201330, 2009 (Springer, Heidelberg, Germany, 2009), pp. 351\u2013368","DOI":"10.1007\/978-3-642-01001-9_20"},{"key":"9243_CR10","doi-asserted-by":"crossref","unstructured":"R. Canetti, M. Fischlin, Universally composable commitments, in Joe Kilian, editor, Advances in Cryptology\u2014CRYPTO\u00a02001, volume 2139 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August\u00a019\u201323, 2001 (Springer, Heidelberg, Germany, 2001), pp. 19\u201340","DOI":"10.1007\/3-540-44647-8_2"},{"key":"9243_CR11","doi-asserted-by":"crossref","unstructured":"R. Canetti, S. Halevi, J. Katz, Chosen-ciphertext security from identity-based encryption, in C. Cachin, J. Camenisch, editors, Advances in Cryptology\u2014EUROCRYPT\u00a02004, volume 3027 of Lecture Notes in Computer Science, Interlaken, Switzerland, May\u00a02\u20136, 2004 (Springer, Heidelberg, Germany, 2004), pp. 207\u2013222","DOI":"10.1007\/978-3-540-24676-3_13"},{"key":"9243_CR12","doi-asserted-by":"crossref","unstructured":"J. Chen, H.W. Lim, S. Ling, H. Wang, H. Wee, Shorter IBE and signatures via asymmetric pairings, in M. Abdalla, T. Lange, editors, PAIRING 2012: 5th International Conference on Pairing-based Cryptography, volume 7708 of Lecture Notes in Computer Science, Cologne, Germany, May\u00a016\u201318, 2013 (Springer, Heidelberg, Germany, 2013), pp. 122\u2013140","DOI":"10.1007\/978-3-642-36334-4_8"},{"key":"9243_CR13","doi-asserted-by":"crossref","unstructured":"R. Cramer, V. Shoup, Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption, in L.R. Knudsen, editor, Advances in Cryptology\u2014EUROCRYPT\u00a02002, volume 2332 of Lecture Notes in Computer Science, Amsterdam, The Netherlands, April\u00a028\u2013May\u00a02, 2002 (Springer, Heidelberg, Germany, 2002), pp. 45\u201364","DOI":"10.1007\/3-540-46035-7_4"},{"key":"9243_CR14","unstructured":"I. Damg\u00e5rd, On $$\\Sigma $$ \u03a3 protocols. http:\/\/www.daimi.au.dk\/~ivan\/Sigma.pdf"},{"issue":"6","key":"9243_CR15","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644\u2013654, 1976.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9243_CR16","doi-asserted-by":"crossref","unstructured":"A. Escala, G. Herold, E. Kiltz, C. R\u00e0fols, J. Villar, An algebraic framework for Diffie\u2013Hellman assumptions, in R. Canetti, J.A. Garay, editors, Advances in Cryptology\u2014CRYPTO\u00a02013, Part II, volume 8043 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August\u00a018\u201322, 2013 (Springer, Heidelberg, Germany, 2013), pp. 129\u2013147","DOI":"10.1007\/978-3-642-40084-1_8"},{"key":"9243_CR17","doi-asserted-by":"crossref","unstructured":"M. Fischlin, B. Libert, M. Manulis, Non-interactive and re-usable universally composable string commitments with adaptive security, in D.H. Lee and Xiaoyun Wang, editors, Advances in Cryptology\u2014ASIACRYPT\u00a02011, volume 7073 of Lecture Notes in Computer Science, Seoul, South Korea, December\u00a04\u20138, 2011 (Springer, Heidelberg, Germany, 2011), pp. 468\u2013485","DOI":"10.1007\/978-3-642-25385-0_25"},{"key":"9243_CR18","doi-asserted-by":"crossref","unstructured":"A. Fiat, A. Shamir, How to prove yourself: Practical solutions to identification and signature problems, in Andrew\u00a0M. Odlyzko, editor, Advances in Cryptology\u2014CRYPTO\u201986, volume 263 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 1987 (Springer, Heidelberg, Germany, 1987), pp. 186\u2013194","DOI":"10.1007\/3-540-47721-7_12"},{"key":"9243_CR19","doi-asserted-by":"crossref","unstructured":"J. Groth, Simulation-sound NIZK proofs for a practical language and constant size group signatures, in X. Lai, K. Chen, editors, Advances in Cryptology\u2014ASIACRYPT\u00a02006, volume 4284 of Lecture Notes in Computer Science, Shanghai, China, December\u00a03\u20137, 2006 (Springer, Heidelberg, Germany, 2006), pp. 444\u2013459","DOI":"10.1007\/11935230_29"},{"key":"9243_CR20","doi-asserted-by":"crossref","unstructured":"J. Groth, A. Sahai, Efficient non-interactive proof systems for bilinear groups, in N.P. Smart, editor, Advances in Cryptology\u2014EUROCRYPT\u00a02008, volume 4965 of Lecture Notes in Computer Science, Istanbul, Turkey, April\u00a013\u201317, 2008 (Springer, Heidelberg, Germany, 2008), pp. 415\u2013432","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"9243_CR21","doi-asserted-by":"crossref","unstructured":"D. Hofheinz, E. Kiltz, Secure hybrid encryption from weakened key encapsulation, in A. Menezes, editor, Advances in Cryptology\u2014CRYPTO\u00a02007, volume 4622 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August\u00a019\u201323, 2007 (Springer, Heidelberg, Germany, 2007), pp. 553\u2013571","DOI":"10.1007\/978-3-540-74143-5_31"},{"key":"9243_CR22","doi-asserted-by":"crossref","unstructured":"C.S. Jutla, A. Roy, Relatively-sound NIZKs and password-based key-exchange, in M. Fischlin, J. Buchmann, M. Manulis, editors, PKC\u00a02012: 15th International Conference on Theory and Practice of Public Key Cryptography, volume 7293 of Lecture Notes in Computer Science, Darmstadt, Germany, May\u00a021\u201323, 2012 (Springer, Heidelberg, Germany, 2012) pp. 485\u2013503","DOI":"10.1007\/978-3-642-30057-8_29"},{"key":"9243_CR23","doi-asserted-by":"crossref","unstructured":"C.S. Jutla, A. Roy, Shorter quasi-adaptive NIZK proofs for linear subspaces, in K. Sako, P. Sarkar, editors, Advances in Cryptology\u2014ASIACRYPT\u00a02013, Part I, volume 8269 of Lecture Notes in Computer Science, Bengalore, India, December\u00a01\u20135, 2013 (Springer, Heidelberg, Germany, 2013), pp. 1\u201320","DOI":"10.1007\/978-3-642-42033-7_1"},{"key":"9243_CR24","doi-asserted-by":"crossref","unstructured":"C.S. Jutla, A. Roy, Switching lemma for bilinear tests and constant-size NIZK proofs for linear subspaces, in J.A. Garay, R. Gennaro, editors, Advances in Cryptology\u2014CRYPTO\u00a02014, Part II, volume 8617 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August\u00a017\u201321, 2014 (Springer, Heidelberg, Germany, 2014), pp. 295\u2013312","DOI":"10.1007\/978-3-662-44381-1_17"},{"key":"9243_CR25","doi-asserted-by":"crossref","unstructured":"C.S. Jutla, A. Roy, Dual-system simulation-soundness with applications to UC-PAKE and more, in T. Iwata and J.H. Cheon, editors, Advances in Cryptology\u2014ASIACRYPT\u00a02015, Part I, volume 9452 of Lecture Notes in Computer Science, Auckland, New Zealand, November\u00a030\u2013December\u00a03, 2015 (Springer, Heidelberg, Germany, 2015), pp. 630\u2013655","DOI":"10.1007\/978-3-662-48797-6_26"},{"key":"9243_CR26","doi-asserted-by":"crossref","unstructured":"J. Katz, V. Vaikuntanathan, Round-optimal password-based authenticated key exchange, in Y. Ishai, editor, TCC\u00a02011: 8th Theory of Cryptography Conference, volume 6597 of Lecture Notes in Computer Science, Providence, RI, USA, March\u00a028\u201330, 2011 (Springer, Heidelberg, Germany, 2011), pp. 293\u2013310","DOI":"10.1007\/978-3-642-19571-6_18"},{"key":"9243_CR27","doi-asserted-by":"crossref","unstructured":"E. Kiltz, H. Wee, Quasi-adaptive NIZK for linear subspaces revisited, in E. Oswald, M. Fischlin, editors, Advances in Cryptology\u2014EUROCRYPT\u00a02015, Part II, volume 9057 of Lecture Notes in Computer Science, Sofia, Bulgaria, April\u00a026\u201330, 2015 (Springer, Heidelberg, Germany, 2015), pp. 101\u2013128","DOI":"10.1007\/978-3-662-46803-6_4"},{"key":"9243_CR28","doi-asserted-by":"crossref","unstructured":"A.B. Lewko, Tools for simulating features of composite order bilinear groups in the prime order setting, in D. Pointcheval, T. Johansson, editors, Advances in Cryptology\u2014EUROCRYPT\u00a02012, volume 7237 of Lecture Notes in Computer Science, Cambridge, UK, April\u00a015\u201319, 2012 (Springer, Heidelberg, Germany, 2012), pp. 318\u2013335","DOI":"10.1007\/978-3-642-29011-4_20"},{"key":"9243_CR29","doi-asserted-by":"crossref","unstructured":"B. Libert, T. Peters, M. Joye, M. Yung, Non-malleability from malleability: Simulation-sound quasi-adaptive NIZK proofs and CCA2-secure encryption from homomorphic signatures, in P.Q. Nguyen, E. Oswald, editors, Advances in Cryptology\u2014EUROCRYPT\u00a02014, volume 8441 of Lecture Notes in Computer Science, Copenhagen, Denmark, May\u00a011\u201315, 2014 (Springer, Heidelberg, Germany, 2014), pp. 514\u2013532","DOI":"10.1007\/978-3-642-55220-5_29"},{"key":"9243_CR30","doi-asserted-by":"crossref","unstructured":"B. Libert, T. Peters, M. Joye, M. Yung, Compactly hiding linear spans\u2014tightly secure constant-size simulation-sound QA-NIZK proofs and applications, in T. Iwata, J.H. Cheon, editors, Advances in Cryptology\u2014ASIACRYPT\u00a02015, Part I, volume 9452 of Lecture Notes in Computer Science, Auckland, New Zealand, November\u00a030\u2013December\u00a03, 2015 (Springer, Heidelberg, Germany, 2015), pp. 681\u2013707","DOI":"10.1007\/978-3-662-48797-6_28"},{"key":"9243_CR31","unstructured":"P. Morillo, C. R\u00e0fols, J.L. Villar, Matrix computational assumptions in multilinear groups. Cryptology ePrint Archive, Report 2015\/353, 2015. http:\/\/eprint.iacr.org\/2015\/353"},{"key":"9243_CR32","doi-asserted-by":"crossref","unstructured":"M. Naor, M. Yung, Public-key cryptosystems provably secure against chosen ciphertext attacks, in 22nd Annual ACM Symposium on Theory of Computing, Baltimore, Maryland, USA, May\u00a014\u201316, 1990 (ACM Press, 1990), pp. 427\u2013437","DOI":"10.1145\/100216.100273"},{"key":"9243_CR33","doi-asserted-by":"crossref","unstructured":"T. Okamoto, K. Takashima, Homomorphic encryption and signatures from vector decomposition, in S.D. Galbraith, K.G. Paterson, editors, PAIRING 2008: 2nd International Conference on Pairing-based Cryptography, volume 5209 of Lecture Notes in Computer Science, Egham, UK, September\u00a01\u20133, 2008 (Springer, Heidelberg, Germany, 2008), pp. 57\u201374","DOI":"10.1007\/978-3-540-85538-5_4"},{"key":"9243_CR34","doi-asserted-by":"crossref","unstructured":"T. Okamoto, K. Takashima, Hierarchical predicate encryption for inner-products, in M. Matsui, editor, Advances in Cryptology\u2014ASIACRYPT\u00a02009, volume 5912 of Lecture Notes in Computer Science, Tokyo, Japan, December\u00a06\u201310, 2009 (Springer, Heidelberg, Germany, 2009), pp. 214\u2013231","DOI":"10.1007\/978-3-642-10366-7_13"},{"key":"9243_CR35","doi-asserted-by":"crossref","unstructured":"C. Rackoff, D.R. Simon, Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack, in J. Feigenbaum, editor, Advances in Cryptology\u2014CRYPTO\u201991, volume 576 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August\u00a011\u201315, 1992 (Springer, Heidelberg, Germany, 1992), pp. 433\u2013444","DOI":"10.1007\/3-540-46766-1_35"},{"key":"9243_CR36","doi-asserted-by":"crossref","unstructured":"S.C. Ramanna, P. Sarkar, Efficient (anonymous) compact HIBE from standard assumptions, in S.S.M. Chow, J.K. Liu, L.C.K. Hui, S.-M. Yiu, editors, ProvSec 2014: 8th International Conference on Provable Security, volume 8782 of Lecture Notes in Computer Science, Hong Kong, China, October\u00a09\u201310, 2014 (Springer, Heidelberg, Germany, 2014), pp. 243\u2013258","DOI":"10.1007\/978-3-319-12475-9_17"},{"key":"9243_CR37","unstructured":"A. Sahai, Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security, in 40th Annual Symposium on Foundations of Computer Science, New York, New York, USA, October\u00a017\u201319, 1999 (IEEE Computer Society Press, 1999) , pp. 543\u2013553"},{"key":"9243_CR38","unstructured":"H. Shacham, A. Cramer\u2013Shoup encryption scheme from the linear assumption and from progressively weaker linear variants. Cryptology ePrint Archive, Report 2007\/074, 2007. http:\/\/eprint.iacr.org\/2007\/074"},{"key":"9243_CR39","doi-asserted-by":"crossref","unstructured":"B. Waters, Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions, in S. Halevi, editor, Advances in Cryptology\u2014CRYPTO\u00a02009, volume 5677 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August\u00a016\u201320, 2009 (Springer, Heidelberg, Germany, 2009), pp. 619\u2013636","DOI":"10.1007\/978-3-642-03356-8_36"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00145-016-9243-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-016-9243-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-016-9243-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T08:44:04Z","timestamp":1749631444000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00145-016-9243-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,12]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["9243"],"URL":"https:\/\/doi.org\/10.1007\/s00145-016-9243-7","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,12]]},"assertion":[{"value":"7 January 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2016","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2016","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}