{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T09:41:58Z","timestamp":1769852518405,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T00:00:00Z","timestamp":1475020800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s10623-016-0276-6","type":"journal-article","created":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T06:23:33Z","timestamp":1475043813000},"page":"469-493","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["A code-based group signature scheme"],"prefix":"10.1007","volume":"82","author":[{"given":"Quentin","family":"Alam\u00e9lou","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Blazy","sequence":"additional","affiliation":[]},{"given":"St\u00e9phane","family":"Cauchie","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Gaborit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,28]]},"reference":[{"key":"276_CR1","doi-asserted-by":"crossref","unstructured":"Chaum D., van Heyst E.: Group signatures. In: Advances in Cryptology\u2014EUROCRYPT \u201991, Workshop on the Theory and Application of Cryptographic Techniques, Brighton 8\u201311 April 1991, Proceedings, pp. 257\u2013265 (1991).","DOI":"10.1007\/3-540-46416-6_22"},{"key":"276_CR2","doi-asserted-by":"crossref","unstructured":"Bellare M., Micciancio D., Warinschi B.: Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions. In: Advances in Cryptology\u2014EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, 4\u20138 May 2003, Proceedings, pp. 614\u2013629 (2003).","DOI":"10.1007\/3-540-39200-9_38"},{"key":"276_CR3","doi-asserted-by":"crossref","unstructured":"Bellare M., Shi H., Zhang C.: Foundations of group signatures: the case of dynamic groups. In: Topics in Cryptology\u2014CT-RSA 2005, The Cryptographers\u2019 Track at the RSA Conference 2005, San Francisco, 14\u201318 Feb 2005, Proceedings, pp. 136\u2013153 (2005).","DOI":"10.1007\/978-3-540-30574-3_11"},{"key":"276_CR4","doi-asserted-by":"crossref","unstructured":"Boneh D., Boyen X., Shacham H.: Short group signatures. In: Advances in Cryptology\u2014CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, 15\u201319 Aug 2004, Proceedings, pp. 41\u201355 (2004).","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"276_CR5","doi-asserted-by":"crossref","unstructured":"Boneh D., Shacham H.: Group signatures with verifier-local revocation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), Washington, DC, 25\u201329 Oct 2004, pp. 168\u2013177 (2004).","DOI":"10.1145\/1030083.1030106"},{"key":"276_CR6","doi-asserted-by":"crossref","unstructured":"Camenisch J., Lysyanskaya A.: Signature schemes and anonymous credentials from bilinear maps. In: Advances in Cryptology\u2014CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, 15\u201319 Aug 2004, Proceedings, pp. 56\u201372 (2004).","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"276_CR7","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e C., Pointcheval D.: Dynamic fully anonymous short group signatures. In: Progress in Cryptology\u2014VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, 25\u201328 Sept 2006, Revised Selected Papers, pp. 193\u2013210 (2006).","DOI":"10.1007\/11958239_13"},{"key":"276_CR8","doi-asserted-by":"crossref","unstructured":"Groth J.: Fully anonymous group signatures without random oracles. In: Advances in Cryptology\u2014ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, 2\u20136 Dec 2007, Proceedings, pp. 164\u2013180 (2007).","DOI":"10.1007\/978-3-540-76900-2_10"},{"key":"276_CR9","doi-asserted-by":"crossref","unstructured":"Kiayias A., Tsiounis Y., Yung M.: Traceable signatures. In: Cachin C., Camenisch J.L. (eds.) Advances in Cryptology\u2014EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 571\u2013589. Springer, Berlin (2004).","DOI":"10.1007\/978-3-540-24676-3_34"},{"key":"276_CR10","doi-asserted-by":"crossref","unstructured":"Libert B., Yung M.: Efficient traceable signatures in the standard model. In: Pairing-Based Cryptography\u2014Pairing 2009, Third International Conference, Palo Alto, 12\u201314 Aug 2009, Proceedings, pp. 187\u2013205 (2009).","DOI":"10.1007\/978-3-642-03298-1_13"},{"key":"276_CR11","doi-asserted-by":"crossref","unstructured":"Gordon S.D., Katz J., Vaikuntanathan V.: A group signature scheme from lattice assumptions. In: Advances in Cryptology\u2014ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 5\u20139 Dec 2010, Proceedings, pp. 395\u2013412 (2010).","DOI":"10.1007\/978-3-642-17373-8_23"},{"key":"276_CR12","doi-asserted-by":"crossref","unstructured":"Laguillaumie F., Langlois A., Libert B., Stehl\u00e9 D.: Lattice-based group signatures with logarithmic signature size. In: Advances in Cryptology\u2014ASIACRYPT 2013, 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, 1\u20135 Dec 2013, Proceedings, Part II, pp. 41\u201361 (2013).","DOI":"10.1007\/978-3-642-42045-0_3"},{"key":"276_CR13","doi-asserted-by":"crossref","unstructured":"Langlois A., Ling S., Nguyen K., Wang H.: Lattice-based group signature scheme with verifier-local revocation. In: Public-Key Cryptography\u2014PKC 2014, 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, 26\u201328 March 2014, Proceedings, pp. 345\u2013361 (2014).","DOI":"10.1007\/978-3-642-54631-0_20"},{"key":"276_CR14","doi-asserted-by":"crossref","unstructured":"Ling S., Nguyen K., Wang H.: Group signatures from lattices: simpler, tighter, shorter, ring-based. In: Public-Key Cryptography\u2014PKC 2015, 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, 30 March\u20131 April 2015, Proceedings, pp. 427\u2013449 (2015).","DOI":"10.1007\/978-3-662-46447-2_19"},{"key":"276_CR15","doi-asserted-by":"crossref","unstructured":"Nguyen P.Q., Zhang J., Zhang Z.: Simpler efficient group signatures from lattices. In: Public-Key Cryptography\u2014PKC 2015, 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, 30 March\u20131 April 2015, Proceedings, pp. 401\u2013426 (2015).","DOI":"10.1007\/978-3-662-46447-2_18"},{"key":"276_CR16","doi-asserted-by":"crossref","unstructured":"Ezerman M.F., Lee H.T., Ling, S., Nguyen, K., Wang, H.: A provably secure group signature scheme from code-based assumptions. In: IACR Cryptology ePrint Archive 2015, 479 (2015).","DOI":"10.1007\/978-3-662-48797-6_12"},{"key":"276_CR17","doi-asserted-by":"crossref","unstructured":"Libert B., Ling S., Mouhartem F., Nguyen K., Wang H.: Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions. In: IACR Cryptology ePrint Archive 2016, 101 (2016).","DOI":"10.1007\/978-3-662-53890-6_13"},{"key":"276_CR18","doi-asserted-by":"crossref","unstructured":"Courtois N., Finiasz M., Sendrier N.: How to achieve a McEliece-based digital signature scheme. In: Advances in Cryptology\u2014ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, 9\u201313 Dec 2001, Proceedings, pp. 157\u2013174 (2001).","DOI":"10.1007\/3-540-45682-1_10"},{"key":"276_CR19","unstructured":"Alam\u00e9lou Q., Blazy O., Cauchie S., Gaborit P.: A code-based group signature scheme. In: Charpin P., Sendrier N., Tillich J.-P. (eds.) The 9th International Workshop on Coding and Cryptography 2015 WCC2015, Proceedings of the 9th International Workshop on Coding and Cryptography 2015 (WCC2015), France, April 2015."},{"key":"276_CR20","doi-asserted-by":"crossref","unstructured":"Goldwasser S., Micali S., Rackoff C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186\u2013208 (1989).","DOI":"10.1137\/0218012"},{"key":"276_CR21","doi-asserted-by":"crossref","unstructured":"Berlekamp E.R., McEliece R.J., van Tilborg H.C.A.: On the inherent intractability of certain coding problems (corresp.). IEEE Trans. Inf. Theory 24(3), 384\u2013386 (1978).","DOI":"10.1109\/TIT.1978.1055873"},{"key":"276_CR22","unstructured":"MacWilliams F.J., Sloane N.J.A.: The Theory of Error-Correcting Codes, 2nd edn. North-Holland, Amsterdam (1978)."},{"key":"276_CR23","doi-asserted-by":"crossref","unstructured":"Arora S., Babai L., Stern J., Sweedyk Z.: The hardness of approximate optima in lattices, codes, and systems of linear equations. In: 34th Annual Symposium on Foundations of Computer Science, Palo Alto, 3\u20135 Nov 1993, pp. 724\u2013733 (1993).","DOI":"10.1109\/SFCS.1993.366815"},{"key":"276_CR24","doi-asserted-by":"crossref","unstructured":"Bellare M., Namprempre C., Pointcheval D., Semanko M.: The one-more-RSA-inversion problems and the security of Chaum\u2019s blind signature scheme. J. Cryptol. 16(3), 185\u2013215 (2003).","DOI":"10.1007\/s00145-002-0120-1"},{"key":"276_CR25","unstructured":"Stern J.: A new identification scheme based on syndrome decoding. In: Advances in Cryptology\u2014CRYPTO \u201993, 13th Annual International Cryptology Conference, Santa Barbara, 22\u201326 Aug 1993, Proceedings, pp. 13\u201321 (1993)."},{"key":"276_CR26","doi-asserted-by":"crossref","unstructured":"Stern J.: A new paradigm for public key identification. IEEE Trans. Inf. Theory 42(6), 1757\u20131768 (1996).","DOI":"10.1109\/18.556672"},{"key":"276_CR27","unstructured":"Fiat A., Shamir A.: How to prove yourself: practical solutions to identification and signature problems. In: Advances in Cryptology\u2014CRYPTO \u201986, Santa Barbara, 1986, Proceedings, pp. 186\u2013194 (1986)."},{"key":"276_CR28","doi-asserted-by":"crossref","unstructured":"Feige U., Shamir A.: Witness indistinguishable and witness hiding protocols. In: Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 13\u201317 May 1990, Baltimore, pp. 416\u2013426 (1990).","DOI":"10.1145\/100216.100272"},{"key":"276_CR29","doi-asserted-by":"crossref","unstructured":"Faug\u00e8re J.-C., Gauthier-Uma\u00f1a V., Otmani A., Perret L., Tillich J.-P.: A distinguisher for high rate mceliece cryptosystems. In: 2011 IEEE Information Theory Workshop, ITW 2011, Paraty Brazil, 16\u201320 Oct 2011, pp. 282\u2013286 (2011).","DOI":"10.1109\/ITW.2011.6089437"},{"key":"276_CR30","unstructured":"Mathew, K. P., Vasant, S., Rangan, C. P.: A provably secure signature and signcryption scheme using the hardness assumptions in coding theory. In: Lee H.-S., Han D.-G. (eds.) Information Security and Cryptology\u2014ICISC 2013: 16th International Conference, Seoul, Korea, 27\u201329 Nov 2013, Revised Selected Papers, pp. 342\u2013362 (2013)."},{"key":"276_CR31","unstructured":"Becker A., Joux A., May A., Meurer A.: Decoding random binary linear codes in 2 n\/20: how $$1 + 1 = 0$$ 1 + 1 = 0 improves information set decoding. In: Advances in Cryptology\u2014EUROCRYPT 2012, 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, 15\u201319 April 2012, Proceedings, pp. 520\u2013536 (2012)."},{"key":"276_CR32","doi-asserted-by":"crossref","unstructured":"Finiasz M., Sendrier N.: Security bounds for the design of code-based cryptosystems. In: Advances in Cryptology\u2014ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, 6\u201310 Dec 2009. Proceedings, pp. 88\u2013105 (2009).","DOI":"10.1007\/978-3-642-10366-7_6"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0276-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-016-0276-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-016-0276-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T19:51:42Z","timestamp":1498333902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-016-0276-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,28]]},"references-count":32,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["276"],"URL":"https:\/\/doi.org\/10.1007\/s10623-016-0276-6","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,28]]}}}