{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:20:12Z","timestamp":1759638012039,"version":"3.37.3"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:00:00Z","timestamp":1591056000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:00:00Z","timestamp":1591056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000765","name":"University College London","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000765","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2020,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Group signatures allow members of a group to anonymously sign on behalf of the group. Membership is administered by a designated group manager. The group manager can also reveal the identity of a signer if and when needed to enforce accountability and deter abuse. For group signatures to be applicable in practice, they need to support fully dynamic groups, i.e., users may join and leave at any time. Existing security definitions for fully dynamic group signatures are informal, have shortcomings, and are mutually incompatible. We fill the gap by providing a formal rigorous security model for fully dynamic group signatures. Our model is general and is not tailored toward a specific design paradigm and can therefore, as we show, be used to argue about the security of different existing constructions following different design paradigms. Our definitions are stringent and when possible incorporate protection against maliciously chosen keys. We consider both the case where the group management and tracing signatures are administered by the same authority, i.e.,\u00a0a single group manager, and also the case where those roles are administered by two separate authorities, i.e., a group manager and an opening authority. We also show that a specialization of our model captures existing models for static and partially dynamic schemes. In the process, we identify a subtle gap in the security achieved by group signatures using revocation lists. We show that in such schemes new members achieve a slightly weaker notion of traceability. The flexibility of our security model allows to capture such relaxation of traceability.<\/jats:p>","DOI":"10.1007\/s00145-020-09357-w","type":"journal-article","created":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T23:10:21Z","timestamp":1591139421000},"page":"1822-1870","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Foundations of Fully Dynamic Group Signatures"],"prefix":"10.1007","volume":"33","author":[{"given":"Jonathan","family":"Bootle","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Cerulli","sequence":"additional","affiliation":[]},{"given":"Pyrros","family":"Chaidos","sequence":"additional","affiliation":[]},{"given":"Essam","family":"Ghadafi","sequence":"additional","affiliation":[]},{"given":"Jens","family":"Groth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,2]]},"reference":[{"key":"9357_CR1","unstructured":"G.\u00a0Ateniese, J.\u00a0Camenisch, S.\u00a0Hohenberger, B.\u00a0de\u00a0Medeiros, Practical group signatures without random oracles. IACR Cryptology ePrint Archive (2005)"},{"key":"9357_CR2","doi-asserted-by":"crossref","unstructured":"G.\u00a0Ateniese, J.\u00a0Camenisch, M.\u00a0Joye, G.\u00a0Tsudik, A practical and provably secure coalition-resistant group signature scheme, in Advances in Cryptology - CRYPTO (2000)","DOI":"10.1007\/3-540-44598-6_16"},{"issue":"2","key":"9357_CR3","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s00145-014-9196-7","volume":"29","author":"M Abe","year":"2016","unstructured":"M.\u00a0Abe, G.\u00a0Fuchsbauer, J.\u00a0Groth, K.\u00a0Haralambiev, M.\u00a0Ohkubo, Structure-preserving signatures and commitments to group elements. J. Cryptology. \u00a029(2):363\u2013421, (2016)","journal-title":"J. Cryptology."},{"key":"9357_CR4","doi-asserted-by":"crossref","unstructured":"M.\u00a0Abdalla, B.\u00a0Warinschi, On the minimal assumptions of group signature schemes, in ICICS, vol. 3269 of Lecture Notes in Computer Science (2004)","DOI":"10.1007\/978-3-540-30191-2_1"},{"key":"9357_CR5","doi-asserted-by":"crossref","unstructured":"D.\u00a0Boneh, X.\u00a0Boyen, H.\u00a0Shacham, Short group signatures, in Advances in Cryptology - CRYPTO (2004)","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"9357_CR6","doi-asserted-by":"crossref","unstructured":"E.F. Brickell, J.\u00a0Camenisch, L.\u00a0Chen, Direct anonymous attestation, in Conference on Computer and Communications Security - CCS (2004)","DOI":"10.1145\/1030083.1030103"},{"key":"9357_CR7","doi-asserted-by":"crossref","unstructured":"J.\u00a0Bootle, A.\u00a0Cerulli, P.\u00a0Chaidos, E.\u00a0Ghadafi, J.\u00a0Groth, C.\u00a0Petit, Short accountable ring signatures based on DDH, in Computer Security - ESORICS (2015)","DOI":"10.1007\/978-3-319-24174-6_13"},{"key":"9357_CR8","doi-asserted-by":"crossref","unstructured":"J.\u00a0Bootle, A.\u00a0Cerulli, P.\u00a0Chaidos, E.\u00a0Ghadafi, J.\u00a0Groth, Foundations of fully dynamic group signatures, in Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (2016)","DOI":"10.1007\/978-3-319-39555-5_7"},{"key":"9357_CR9","doi-asserted-by":"crossref","unstructured":"J.\u00a0Bootle, A.\u00a0Cerulli, P.\u00a0Chaidos, E.\u00a0Ghadafi, J.\u00a0Groth, Foundations of fully dynamic group signatures. IACR Cryptology ePrint Archive (2016)","DOI":"10.1007\/978-3-319-39555-5_7"},{"key":"9357_CR10","doi-asserted-by":"crossref","unstructured":"P.\u00a0Bichsel, J.\u00a0Camenisch, G.\u00a0Neven, N.P. Smart, B.\u00a0Warinschi, Get shorty via group signatures without encryption, in Security and Cryptography for Networks - SCN (2010)","DOI":"10.1007\/978-3-642-15317-4_24"},{"key":"9357_CR11","doi-asserted-by":"crossref","unstructured":"O.\u00a0Blazy, D.\u00a0Derler, D.\u00a0Slamanig, R.\u00a0Spreitzer, Non-interactive plaintext (in-)equality proofs and group signatures with verifiable controllable linkability, in Topics in Cryptology - CT-RSA (2016)","DOI":"10.1007\/978-3-319-29485-8_8"},{"key":"9357_CR12","first-page":"641","volume":"2018","author":"M Backes","year":"2018","unstructured":"M.\u00a0Backes, L.\u00a0Hanzlik, J.\u00a0Schneider, Membership privacy for fully dynamic group signatures. IACR Cryptology ePrint Archive.\u00a02018:641, (2018)","journal-title":"IACR Cryptology ePrint Archive."},{"issue":"1","key":"9357_CR13","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s00145-007-9011-9","volume":"22","author":"A Bender","year":"2009","unstructured":"A.\u00a0Bender, J.\u00a0Katz, R.\u00a0Morselli, Ring signatures: Stronger definitions, and constructions without random oracles. Journal of Cryptology.\u00a022(1):114\u2013138, (2009)","journal-title":"Journal of Cryptology."},{"key":"9357_CR14","doi-asserted-by":"crossref","unstructured":"M.\u00a0Bellare, D.\u00a0Micciancio, B.\u00a0Warinschi, Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions, in Advances in Cryptology - EUROCRYPT (2003)","DOI":"10.1007\/3-540-39200-9_38"},{"key":"9357_CR15","doi-asserted-by":"crossref","unstructured":"M.\u00a0Bellare, P.\u00a0Rogaway, Random oracles are practical: A paradigm for designing efficient protocols, in Conference on Computer and Communications Security - CCS (1993)","DOI":"10.1145\/168588.168596"},{"key":"9357_CR16","unstructured":"E.\u00a0Brickell, An efficient protocol for anonymously providing assurance of the container of a private key. Submitted to the Trusted Computing Group (2004)"},{"key":"9357_CR17","doi-asserted-by":"crossref","unstructured":"E.\u00a0Bresson, J.\u00a0Stern, Efficient revocation in group signatures, in Public Key Cryptography - PKC (2001)","DOI":"10.1007\/3-540-44586-2_15"},{"key":"9357_CR18","doi-asserted-by":"crossref","unstructured":"D.\u00a0Boneh, H.\u00a0Shacham, Group signatures with verifier-local revocation, in Conference on Computer and Communications Security - CCS (2004)","DOI":"10.1145\/1030083.1030106"},{"key":"9357_CR19","doi-asserted-by":"crossref","unstructured":"M.\u00a0Bellare, H.\u00a0Shi, C.\u00a0Zhang, Foundations of group signatures: The case of dynamic groups, in Topics in Cryptology - CT-RSA (2005)","DOI":"10.1007\/978-3-540-30574-3_11"},{"key":"9357_CR20","doi-asserted-by":"crossref","unstructured":"X.\u00a0Boyen, B.\u00a0Waters, Compact group signatures without random oracles, in Advances in Cryptology - EUROCRYPT (2006)","DOI":"10.1007\/11761679_26"},{"key":"9357_CR21","unstructured":"X.\u00a0Boyen, B.\u00a0Waters, Full-domain subgroup hiding and constant-size group signatures, in Public Key Cryptography - PKC (2007)"},{"key":"9357_CR22","doi-asserted-by":"crossref","unstructured":"J.\u00a0Camenisch, R.\u00a0Chaabouni, A.\u00a0Shelat, Efficient protocols for set membership and range proofs, in Advances in Cryptology - ASIACRYPT (2008)","DOI":"10.1007\/978-3-540-89255-7_15"},{"key":"9357_CR23","doi-asserted-by":"crossref","unstructured":"J.\u00a0Camenisch, J.\u00a0Groth, Group signatures: Better efficiency and new theoretical aspects, in Security in Communication Networks - SCN (2004)","DOI":"10.1007\/978-3-540-30598-9_9"},{"key":"9357_CR24","doi-asserted-by":"crossref","unstructured":"J.\u00a0Camenisch, A.\u00a0Lysyanskaya, Dynamic accumulators and application to efficient revocation of anonymous credentials, in Advances in Cryptology - CRYPTO (2002)","DOI":"10.1007\/3-540-45708-9_5"},{"key":"9357_CR25","doi-asserted-by":"crossref","unstructured":"J.\u00a0Camenisch, A.\u00a0Lysyanskaya, Signature schemes and anonymous credentials from bilinear maps, in Advances in Cryptology - CRYPTO (2004)","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"9357_CR26","unstructured":"J.\u00a0Camenisch, M.\u00a0Michels, A group signature scheme with improved efficiency, in Advances in Cryptology - ASIACRYPT (1998)"},{"key":"9357_CR27","doi-asserted-by":"crossref","unstructured":"D.\u00a0Chaum, E.\u00a0van Heyst, Group signatures, in Advances in Cryptology - EUROCRYPT (1991)","DOI":"10.1007\/3-540-46416-6_22"},{"key":"9357_CR28","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Dodis, A.\u00a0Kiayias, A.\u00a0Nicolosi, V.\u00a0Shoup, Anonymous identification in ad hoc groups, in Advances in Cryptology - EUROCRYPT (2004)","DOI":"10.1007\/978-3-540-24676-3_36"},{"key":"9357_CR29","doi-asserted-by":"crossref","unstructured":"C.\u00a0Delerabl\u00e9e, D.\u00a0Pointcheval, Dynamic fully anonymous short group signatures, in Progressing Cryptology - VIETCRYPT (2006)","DOI":"10.1007\/11958239_13"},{"key":"9357_CR30","doi-asserted-by":"crossref","unstructured":"D.\u00a0Derler, D.\u00a0Slamanig, Highly-efficient fully-anonymous dynamic group signatures, in Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04\u201308, 2018 (2018)","DOI":"10.1145\/3196494.3196507"},{"key":"9357_CR31","doi-asserted-by":"crossref","unstructured":"K.\u00a0Emura, G.\u00a0Hanaoka, Y.\u00a0Kawai, T.\u00a0Matsuda, K.\u00a0Ohara, K.\u00a0Omote, Y.\u00a0Sakai, Group signatures with message-dependent opening: Formal definitions and constructions. Security and Communication Networks (2019)","DOI":"10.1155\/2019\/4872403"},{"key":"9357_CR32","doi-asserted-by":"crossref","unstructured":"A.\u00a0El\u00a0Kaafarani, S.\u00a0Katsumata, R.\u00a0Solomon, Anonymous reputation systems achieving full dynamicity from lattices, in Financial Cryptography and Data Security - 22st International Conference, FC 2018 (2018)","DOI":"10.1007\/978-3-662-58387-6_21"},{"key":"9357_CR33","doi-asserted-by":"crossref","unstructured":"J.\u00a0Furukawa, H.\u00a0Imai, An efficient group signature scheme from bilinear maps, in Information Security and Privacy - ACISP (2005)","DOI":"10.1007\/11506157_38"},{"key":"9357_CR34","doi-asserted-by":"crossref","unstructured":"J.\u00a0Furukawa, S.\u00a0Yonezawa, Group signatures with separate and distributed authorities, in Security in Communication Networks - SCN (2004)","DOI":"10.1007\/978-3-540-30598-9_6"},{"key":"9357_CR35","doi-asserted-by":"crossref","unstructured":"E.\u00a0Ghadafi, Efficient distributed tag-based encryption and its application to group signatures with efficient distributed traceability, in Progress in Cryptology - LATINCRYPT (2014)","DOI":"10.1007\/978-3-319-16295-9_18"},{"key":"9357_CR36","doi-asserted-by":"crossref","unstructured":"L.\u00a0Garms, A.\u00a0Lehmann, Group signatures with selective linkability, in Public-Key Cryptography - PKC (2019)","DOI":"10.1007\/978-3-030-17253-4_7"},{"key":"9357_CR37","doi-asserted-by":"crossref","unstructured":"J.\u00a0Groth, Simulation-sound NIZK proofs for a practical language and constant size group signatures, in Advances in Cryptology - ASIACRYPT (2006)","DOI":"10.1007\/11935230_29"},{"key":"9357_CR38","unstructured":"J.\u00a0Groth, Fully anonymous group signatures without random oracles, in Advances in Cryptology - ASIACRYPT (2007)"},{"key":"9357_CR39","doi-asserted-by":"crossref","unstructured":"J.Y. Hwang, S.\u00a0Lee, B.-H. Chung, H.S. Cho, D.\u00a0Nyang, Short group signatures with controllable linkability, in Lightweight Security & Privacy: Devices, Protocols and Applications (LightSec) (2011)","DOI":"10.1109\/LightSec.2011.12"},{"key":"9357_CR40","doi-asserted-by":"crossref","unstructured":"S.\u00a0Krenn, K.\u00a0Samelin, C.\u00a0Striecks, Practical group-signatures with privacy-friendly openings, in Availability, Reliability and Security - ARES (2019)","DOI":"10.1145\/3339252.3339256"},{"key":"9357_CR41","doi-asserted-by":"crossref","unstructured":"A.\u00a0Kiayias, Y.\u00a0Tsiounis, M.\u00a0Yung, Traceable signatures, in Advances in Cryptology - EUROCRYPT (2004)","DOI":"10.1007\/978-3-540-24676-3_34"},{"key":"9357_CR42","doi-asserted-by":"crossref","unstructured":"A.\u00a0Kiayias, M.\u00a0Yung, Group signatures with efficient concurrent join, in Advances in Cryptology - EUROCRYPT (2005)","DOI":"10.1007\/11426639_12"},{"issue":"1\/2","key":"9357_CR43","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1504\/IJSN.2006.010821","volume":"1","author":"A Kiayias","year":"2006","unstructured":"A.\u00a0Kiayias, M.\u00a0Yung, Secure scalable group signature with dynamic joins and separable authorities. IJSN.\u00a01(1\/2):24\u201345 (2006)","journal-title":"IJSN."},{"key":"9357_CR44","doi-asserted-by":"crossref","unstructured":"B.\u00a0Libert, S.\u00a0Ling, F.\u00a0Mouhartem, K.\u00a0Nguyen, H.\u00a0Wang, Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions, in Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4\u20138, 2016, Proceedings, Part II (2016)","DOI":"10.1007\/978-3-662-53890-6_13"},{"key":"9357_CR45","doi-asserted-by":"crossref","unstructured":"A.\u00a0Langlois, S.\u00a0Ling, K.\u00a0Nguyen, H.\u00a0Wang, Lattice-based group signature scheme with verifier-local revocation, in Public-Key Cryptography - PKC (2014)","DOI":"10.1007\/978-3-642-54631-0_20"},{"key":"9357_CR46","doi-asserted-by":"crossref","unstructured":"B.\u00a0Libert, S.\u00a0Ling, K.\u00a0Nguyen, H.\u00a0Wang, Zero-knowledge arguments for lattice-based accumulators: Logarithmic-size ring signatures and group signatures without trapdoors, in Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (2016)","DOI":"10.1007\/978-3-662-49896-5_1"},{"key":"9357_CR47","doi-asserted-by":"crossref","unstructured":"S.\u00a0Ling, K.\u00a0Nguyen, H.\u00a0Wang, Y.\u00a0Xu, Lattice-based group signatures: Achieving full dynamicity (and deniability) with ease. CoRR, arXiv:1801.08737 (2018)","DOI":"10.1007\/978-3-319-61204-1_15"},{"key":"9357_CR48","doi-asserted-by":"crossref","unstructured":"B.\u00a0Libert, T.\u00a0Peters, M.\u00a0Yung, Group signatures with almost-for-free revocation, in Advances in Cryptology - CRYPTO (2012)","DOI":"10.1007\/978-3-642-32009-5_34"},{"key":"9357_CR49","doi-asserted-by":"crossref","unstructured":"B.\u00a0Libert, T.\u00a0Peters, M.\u00a0Yung, Scalable group signatures with revocation, in Advances in Cryptology - EUROCRYPT (2012)","DOI":"10.1007\/978-3-642-29011-4_36"},{"key":"9357_CR50","doi-asserted-by":"crossref","unstructured":"B.\u00a0Libert, D.\u00a0Vergnaud, Group signatures with verifier-local revocation and backward unlinkability in the standard model, in Cryptology and Network Security - CANS (2009)","DOI":"10.1007\/978-3-642-10433-6_34"},{"key":"9357_CR51","doi-asserted-by":"crossref","unstructured":"R.W.F. Lai, T.\u00a0Zhang, S.S.M. Chow, D.\u00a0Schr\u00f6der, Efficient sanitizable signatures without random oracles, in Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26\u201330, 2016, Proceedings, Part I (2016)","DOI":"10.1007\/978-3-319-45744-4_18"},{"key":"9357_CR52","doi-asserted-by":"crossref","unstructured":"T.\u00a0Nakanishi, N.\u00a0Funabiki, Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps, in Advances in Cryptology - ASIACRYPT (2005)","DOI":"10.1007\/11593447_29"},{"key":"9357_CR53","doi-asserted-by":"crossref","unstructured":"T.\u00a0Nakanishi, H.\u00a0Fujii, Y.\u00a0Hira, N.\u00a0Funabiki, Revocable group signature schemes with constant costs for signing and verifying, in Public Key Cryptography - PKC (2009)","DOI":"10.1007\/978-3-642-00468-1_26"},{"issue":"7","key":"9357_CR54","first-page":"3085","volume":"40","author":"T Nakanishi","year":"1999","unstructured":"T.\u00a0Nakanishi, T.\u00a0Fujiwara, H.\u00a0Watanabe, A linkable group signature and its application to secret voting. Transactions of Information Processing Society of Japan.\u00a040(7):3085\u20133096 (1999)","journal-title":"Transactions of Information Processing Society of Japan."},{"key":"9357_CR55","doi-asserted-by":"crossref","unstructured":"L.\u00a0Nguyen, Accumulators from bilinear pairings and applications, in Topics in Cryptology - CT-RSA (2005)","DOI":"10.1007\/978-3-540-30574-3_19"},{"key":"9357_CR56","doi-asserted-by":"crossref","unstructured":"D.\u00a0Naor, M.\u00a0Naor, J.\u00a0Lotspiech, Revocation and tracing schemes for stateless receivers, in Advances in Cryptology - CRYPTO (2001)","DOI":"10.1007\/3-540-44647-8_3"},{"key":"9357_CR57","doi-asserted-by":"crossref","unstructured":"L.\u00a0Nguyen, R.\u00a0Safavi-Naini, Efficient and provably secure trapdoor-free group signature schemes from bilinear pairings, in Advances in Cryptology - ASIACRYPT (2004)","DOI":"10.1007\/978-3-540-30539-2_26"},{"key":"9357_CR58","doi-asserted-by":"crossref","unstructured":"D.X. Song, Practical forward secure group signature schemes, in Conference on Computer and Communications Security - CCS (2001)","DOI":"10.1145\/501983.502015"},{"key":"9357_CR59","doi-asserted-by":"crossref","unstructured":"Y.\u00a0Sakai, J.C.N. Schuldt, K.\u00a0Emura, G.\u00a0Hanaoka, K.\u00a0Ohta, On the security of dynamic group signatures: Preventing signature hijacking, in Public Key Cryptography - PKC (2012)","DOI":"10.1007\/978-3-642-30057-8_42"},{"key":"9357_CR60","doi-asserted-by":"crossref","unstructured":"I.\u00a0Teranishi, K.\u00a0Sako, k-times anonymous authentication with a constant proving cost, in Public Key Cryptography - PKC (2006)","DOI":"10.1007\/11745853_34"},{"key":"9357_CR61","doi-asserted-by":"crossref","unstructured":"G.\u00a0Tsudik, S.\u00a0Xu, Accumulating composites and improved group signing, in Advances in Cryptology - ASIACRYPT (2003)","DOI":"10.1007\/978-3-540-40061-5_16"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-020-09357-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00145-020-09357-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-020-09357-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T21:16:16Z","timestamp":1722978976000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00145-020-09357-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,2]]},"references-count":61,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["9357"],"URL":"https:\/\/doi.org\/10.1007\/s00145-020-09357-w","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"type":"print","value":"0933-2790"},{"type":"electronic","value":"1432-1378"}],"subject":[],"published":{"date-parts":[[2020,6,2]]},"assertion":[{"value":"23 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}