{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:49:56Z","timestamp":1761767396542,"version":"3.32.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"23-24","license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s00500-024-10325-w","type":"journal-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T12:00:21Z","timestamp":1732708821000},"page":"13053-13070","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A novel and efficient undeniable signature scheme based on group ring"],"prefix":"10.1007","volume":"28","author":[{"given":"Gaurav","family":"Mittal","sequence":"first","affiliation":[]},{"given":"Sandeep","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Sunil","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Shubham","family":"Mittal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"issue":"2","key":"10325_CR1","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1142\/S0218196716500144","volume":"26","author":"A Barker","year":"2016","unstructured":"Barker A (2016) The power conjugacy problem in Higman-Thompson groups. Int J Algebr Comput 26(2):309\u2013374","journal-title":"Int J Algebr Comput"},{"key":"10325_CR2","doi-asserted-by":"crossref","unstructured":"Bernstein DJ, Buchmann J, Dahmen E (2009) Post quantum cryptography, Springer","DOI":"10.1007\/978-3-540-88702-7"},{"key":"10325_CR3","doi-asserted-by":"crossref","unstructured":"Chaum D, Antwerpen H (1990) Undeniable signatures, In: Advances in cryptology-CRYPTO\u201989, volume 3435 of LNCS, 212-216","DOI":"10.1007\/0-387-34805-0_20"},{"issue":"31","key":"10325_CR4","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.12988\/imf.2006.06129","volume":"1","author":"T Chen","year":"2006","unstructured":"Chen T, Hsu E, Yu Y (2006) A new elliptic curve undeniable signature scheme. Int Math Forum 1(31):1529\u20131536","journal-title":"Int Math Forum"},{"issue":"146","key":"10325_CR5","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.21136\/CMJ.2020.0171-20","volume":"71","author":"C Dietzel","year":"2021","unstructured":"Dietzel C, Mittal G (2021) Summands of finite group algebras. Czech Math J 71(146):1011\u20131014","journal-title":"Czech Math J"},{"key":"10325_CR6","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22:644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"10325_CR7","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1007\/s10559-014-9672-y","volume":"50","author":"A Fesenko","year":"2014","unstructured":"Fesenko A (2014) Vulnerability of cryptographic primitives based on the power conjugacy search problem in quantum computing. Cyber Sys Anal 50:815\u2013816","journal-title":"Cyber Sys Anal"},{"key":"10325_CR8","unstructured":"GAP (2022) Groups, Algorithms, Programming, www.gap-system.org, version 4.12.2,"},{"key":"10325_CR9","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s001450010001","volume":"13","author":"R Gennaro","year":"2000","unstructured":"Gennaro R, Krawczyk H, Rabin T (2000) RSA-based undeniable signatures. J Cryptol 13:397\u2013416","journal-title":"J Cryptol"},{"key":"10325_CR10","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/s00200-016-0293-8","volume":"27","author":"N Goel","year":"2016","unstructured":"Goel N, Gupta I, Dubey M (2016) Undeniable signature scheme based over group ring. AAECC 27:523\u2013535","journal-title":"AAECC"},{"key":"10325_CR11","doi-asserted-by":"crossref","unstructured":"Hoffstein J, Pipher J, Silverman J. H (2008) An introduction of mathematical cryptography, Springer","DOI":"10.1007\/978-0-387-77993-5_6"},{"issue":"6","key":"10325_CR12","first-page":"1512","volume":"7","author":"S Horng","year":"2013","unstructured":"Horng S, Tzeng S, Fan P, Wang X, Li T, Khan M (2013) Secure convertible undeniable signature scheme using extended Euclidean algorithm without random oracles. KSII Trans Int Info Sys 7(6):1512\u20131533","journal-title":"KSII Trans Int Info Sys"},{"key":"10325_CR13","unstructured":"Huang Q, Wong D. S (2009) New constructions of convertible undeniable signature schemes without random oracles, Cryptology ePrint Archive, Report 2009\/517, http:\/\/eprint.iacr.org\/"},{"issue":"1","key":"10325_CR14","first-page":"67","volume":"69","author":"B Hurley","year":"2011","unstructured":"Hurley B, Hurley T (2011) Group ring cryptography. Int J Pure Appl Math 69(1):67\u201386","journal-title":"Int J Pure Appl Math"},{"issue":"11","key":"10325_CR15","doi-asserted-by":"publisher","first-page":"1279","DOI":"10.1007\/s00521-016-2745-2","volume":"29","author":"S Inam","year":"2018","unstructured":"Inam S, Ali R (2018) A new ElGamal-like cryptosystem based on matrices over groupring. Neural Comput Applic 29(11):1279\u20131283","journal-title":"Neural Comput Applic"},{"key":"10325_CR16","doi-asserted-by":"crossref","unstructured":"Kumar S, Mittal G, Kumar S (2022) Digital signature schemes based on group ring. Springer Nature Computer Science 3:398","DOI":"10.1007\/s42979-022-01286-8"},{"key":"10325_CR17","unstructured":"Menzes A, Oorschot P, Vanstone S (2001) Handbook of applied cryptography, CRC Press"},{"key":"10325_CR18","unstructured":"Milies CP, Sehgal SK (2002) An introduction to group rings, Kluwer"},{"issue":"6","key":"10325_CR19","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1080\/09720529.2020.1796868","volume":"25","author":"G Mittal","year":"2022","unstructured":"Mittal G, Kumar S, Narain S, Kumar S (2022) Group rings based public key cryptosystems. J Discret Math Sci Cryptogr 25(6):1683\u20131704","journal-title":"J Discret Math Sci Cryptogr"},{"key":"10325_CR20","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s12046-022-01806-5","volume":"47","author":"G Mittal","year":"2022","unstructured":"Mittal G, Kumar S, Kumar S (2022) A quantum secure ID-based cryptographic encryption based on group rings. Sadhana 47:35","journal-title":"Sadhana"},{"key":"10325_CR21","doi-asserted-by":"crossref","unstructured":"Pandey A, Gupta I (2022) A new undeniable signature scheme on general linear group over group ring. J Discret Math Sci Cryptogr 25(5):1261\u20131273","DOI":"10.1080\/09720529.2020.1744814"},{"key":"10325_CR22","doi-asserted-by":"crossref","unstructured":"Phong LT, Kurosawa K, Ogata W (2009a) New rsa-based (selectively) convertible undeniable signature schemes, In AFRICACRYPT, volume 5580 of LNCS, pages 116-134. Springer","DOI":"10.1007\/978-3-642-02384-2_8"},{"key":"10325_CR23","doi-asserted-by":"crossref","unstructured":"Phong LT, Kurosawa K, Ogata W (2009b) Provably secure convertible undeniable signatures with unambiguity, Cryptology ePrint Archive, Report 2009\/394, http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-15317-4_19"},{"issue":"3","key":"10325_CR24","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/s10958-008-9168-2","volume":"154","author":"SK Rososhek","year":"2008","unstructured":"Rososhek SK (2008) Cryptosystems in automorphism groups of group rings of Abelian groups. J Math Sci (N.Y.) 154(3):386\u2013391","journal-title":"J Math Sci (N.Y.)"},{"key":"10325_CR25","volume-title":"ISPEC 2010","author":"J Schuldt","year":"2012","unstructured":"Schuldt J, Matsuura K (2012) An efficient convertible undeniable signature scheme with delegatable verification. ISPEC 2010, vol 6047. Springer, Berlin"},{"key":"10325_CR26","first-page":"265","volume":"6","author":"T Thomas","year":"2008","unstructured":"Thomas T, Lal A (2008) A zero-knowledge undeniable signature scheme in non-abelian group setting. Int J Netw Secur 6:265\u2013269","journal-title":"Int J Netw Secur"},{"key":"10325_CR27","doi-asserted-by":"crossref","unstructured":"Yuen T. H, Au M. H, Liu J. K, Susilo W (2007) (convertible) undeniable signatures without random oracles, Cryptology ePrint Archive, Report 2007\/386, . http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-540-77048-0_7"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-024-10325-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-024-10325-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-024-10325-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T13:13:53Z","timestamp":1734959633000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-024-10325-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"references-count":27,"journal-issue":{"issue":"23-24","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["10325"],"URL":"https:\/\/doi.org\/10.1007\/s00500-024-10325-w","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2024,11,27]]},"assertion":[{"value":"17 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 November 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}