{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:02:46Z","timestamp":1770278566696,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10623-022-01007-5","type":"journal-article","created":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T10:02:33Z","timestamp":1643623353000},"page":"2861-2891","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["New code-based cryptographic accumulator and fully dynamic group signature"],"prefix":"10.1007","volume":"90","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3122-1661","authenticated-orcid":false,"given":"Edoukou Berenger","family":"Ayebie","sequence":"first","affiliation":[]},{"given":"El Mamoun","family":"Souidi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,31]]},"reference":[{"issue":"1\u20132","key":"1007_CR1","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s10623-016-0276-6","volume":"82","author":"Q Alam\u00e9lou","year":"2017","unstructured":"Alam\u00e9lou Q., Blazy O., Cauchie S., Gaborit P.: A code-based group signature scheme. Des. Codes Cryptogr. 82(1\u20132), 469\u2013493 (2017).","journal-title":"Des. Codes Cryptogr."},{"key":"1007_CR2","doi-asserted-by":"crossref","unstructured":"Assidi H., Ayebie E.B., Souidi E.M.: A code-based group signature scheme with shorter public key length. In: SECRYPT-Lisbon, pp. 432\u2013439. SciTePress (2016)","DOI":"10.5220\/0005969204320439"},{"key":"1007_CR3","doi-asserted-by":"crossref","unstructured":"Assidi H., Ayebie E.B., Souidi E.M.: Two mutual authentication protocols based on zero-knowledge proofs for RFID systems. In: ICISC, Seoul, South Korea, volume 10779 of Lecture Notes in Computer Science, pp. 267\u2013283. Springer (2017)","DOI":"10.1007\/978-3-319-78556-1_15"},{"key":"1007_CR4","doi-asserted-by":"crossref","unstructured":"Augot D., Finiasz M., Sendrier N.: A family of fast syndrome based cryptographic hash functions. In: Mycrypt, Kuala Lumpur, volume 3715 of Lecture Notes in Computer Science, pp. 64\u201383. Springer (2005)","DOI":"10.1007\/11554868_6"},{"key":"1007_CR5","unstructured":"Augot D., Finiasz M., Sendrier N.: A fast provably secure cryptographic hash function. In: IACR Cryptology ePrint Archive (2003)"},{"key":"1007_CR6","doi-asserted-by":"crossref","unstructured":"Ayebie B.E., Assidi H., Souidi E.M.: A new dynamic code-based group signature scheme. In: C2SI, Rabat, Morocco, volume 10194 of Lecture Notes in Computer Science, pp. 346\u2013364. Springer (2017)","DOI":"10.1007\/978-3-319-55589-8_23"},{"key":"1007_CR7","doi-asserted-by":"crossref","unstructured":"Benaloh J., Mare M.de: One-way accumulators: a decentralized alternative to digital signatures. In: Helleseth, T. (ed.) Advances in Cryptology-EUROCRYPT \u201993, volume 765 of Lecture Notes in Computer Science, pp. 274\u2013285. Springer (1994)","DOI":"10.1007\/3-540-48285-7_24"},{"key":"1007_CR8","doi-asserted-by":"crossref","unstructured":"Bootle J., Cerulli A., Chaidos P., Ghadafi E., Groth J.: Foundations of fully dynamic group signatures. In: 14th International Conference, ACNS 2016, Guildford June 19\u201322, 2016., volume 9696 of Lecture Notes in Computer Science, pp. 117\u2013136. Springer (2016)","DOI":"10.1007\/978-3-319-39555-5_7"},{"issue":"5","key":"1007_CR9","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/s10207-012-0169-2","volume":"11","author":"P Camacho","year":"2012","unstructured":"Camacho P., Hevia A., Kiwi M., Opazo R.: Strong accumulators from collision-resistant hashing. Int. J. Inform Secur. 11(5), 349\u2013363 (2012).","journal-title":"Int. J. Inform Secur."},{"key":"1007_CR10","doi-asserted-by":"crossref","unstructured":"Camenisch J., Kohlweiss M., Soriente C.: An accumulator based on bilinear maps and efficient revocation for anonymous credentials. In: PKC, volume 5443 of Lecture Notes in Computer Science, pp. 481\u2013500. Springer (2009)","DOI":"10.1007\/978-3-642-00468-1_27"},{"key":"1007_CR11","doi-asserted-by":"crossref","unstructured":"Camenisch J., Lysyanskaya A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: CRYPTO, Santa Barbara, California, USA, volume 2442 of Lecture Notes in Computer Science, pp. 61\u201376. Springer (2002)","DOI":"10.1007\/3-540-45708-9_5"},{"key":"1007_CR12","doi-asserted-by":"crossref","unstructured":"Catalano D., Fiore D.: Vector commitments and their applications. In: PKC, Nara, Japan, volume 7778 of Lecture Notes in Computer Science, pp. 55\u201372. Springer (2013)","DOI":"10.1007\/978-3-642-36362-7_5"},{"key":"1007_CR13","doi-asserted-by":"crossref","unstructured":"Derler D., Hanser C., Slamanig D.: Revisiting cryptographic accumulators, additional properties and relations to other primitives. In: Nyberg K. (ed.) CT-RSA 2015, San Francisco, CA, USA, April 20\u201324, volume 9048 of Lecture Notes in Computer Science, pp. 127\u2013144. Springer (2015)","DOI":"10.1007\/978-3-319-16715-2_7"},{"key":"1007_CR14","doi-asserted-by":"crossref","unstructured":"Derler D., Ramacher S., Slamanig D.: Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives. In: PQCrypto, Fort Lauderdale, FL, USA, volume 10786 of Lecture Notes in Computer Science, pp. 419\u2013440. Springer (2018)","DOI":"10.1007\/978-3-319-79063-3_20"},{"key":"1007_CR15","unstructured":"Finiasz M., Gaborit P., Sendrier N., Manuel S.: SHA-3 proposal: FSB. In: Proposal of a hash function for the NIST SHA-3 competition (2008) https:\/\/hal.inria.fr\/inria-00564012"},{"key":"1007_CR16","doi-asserted-by":"crossref","unstructured":"Goldreich O., Levin L.A.: A hard-core predicate for all one-way functions. In: 21st Annual ACM Symposium on Theory of Computing, Seattle, Washigton, USA, pp. 25\u201332. ACM (1989)","DOI":"10.1145\/73007.73010"},{"key":"1007_CR17","doi-asserted-by":"crossref","unstructured":"Jakobsson M., Leighton F.T., Micali S., Szydlo M.: Fractal Merkle Tree representation and traversal. In: CT-RSA, San Francisco, CA, USA, April 13\u201317, volume 2612 of Lecture Notes in Computer Science (2003)","DOI":"10.1007\/3-540-36563-X_21"},{"key":"1007_CR18","doi-asserted-by":"crossref","unstructured":"Jhanwar M.P., Safavi-Naini R.: Compact accumulator using lattices. In: SPACE, Jaipur, India, volume 9354 of Lecture Notes in Computer Science, pp. 347\u2013358. Springer (2015)","DOI":"10.1007\/978-3-319-24126-5_20"},{"key":"1007_CR19","doi-asserted-by":"crossref","unstructured":"Kumar A., Lafourcade P., Lauradoux C.: Performances of cryptographic accumulators. In: IEEE, Local Computer Networks LCN, Edmonton, AB, Canada, pp. 366\u2013369. IEEE Computer Society (2014)","DOI":"10.1109\/LCN.2014.6925793"},{"key":"1007_CR20","doi-asserted-by":"crossref","unstructured":"Li J., Li N., Xue R.: Universal accumulators with efficient nonmembership proofs. In: ACNS, Zhuhai, China, volume 4521 of Lecture Notes in Computer Science, pp. 253\u2013269. Springer (2007)","DOI":"10.1007\/978-3-540-72738-5_17"},{"key":"1007_CR21","doi-asserted-by":"crossref","unstructured":"Libert B., Ling S., Nguyen K., Wang H.: Zero-knowledge arguments for lattice-based accumulators: Logarithmic-size ring signatures and group signatures without trapdoors. In: EUROCRYPT, Vienna, Austria, volume 9666 of Lecture Notes in Computer Science, pp. 1\u201331. Springer (2016)","DOI":"10.1007\/978-3-662-49896-5_1"},{"key":"1007_CR22","doi-asserted-by":"crossref","unstructured":"Ling S., Nguyen K., Wang H., Xu Y.: Lattice-based group signatures: Achieving full dynamicity with ease. In: ACNS, Kanazawa, Japan, volume 10355 of Lecture Notes in Computer Science, pp. 293\u2013312. Springer (2017)","DOI":"10.1007\/978-3-319-61204-1_15"},{"key":"1007_CR23","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.tcs.2019.03.023","volume":"783","author":"S Ling","year":"2019","unstructured":"Ling S., Nguyen K., Wang H., Xu Y.: Lattice-based group signatures: achieving full dynamicity (and deniability) with ease. Theor. Comput. Sci. 783, 71\u201394 (2019).","journal-title":"Theor. Comput. Sci."},{"key":"1007_CR24","doi-asserted-by":"crossref","unstructured":"Nguyen K., Tang H., Wang H., Zeng N.: New code-based privacy-preserving cryptographic constructions. In: Galbraith SD., Moriai S. (eds.) Advances in Cryptology-ASIACRYPT-Kobe, Japan, December 8\u201312, volume 11922 of Lecture Notes in Computer Science, pp. 25\u201355. Springer (2019)","DOI":"10.1007\/978-3-030-34621-8_2"},{"issue":"3","key":"1007_CR25","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D., Stern J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000).","journal-title":"J. Cryptol."},{"key":"1007_CR26","unstructured":"The FlexiProvider group at Technische Universit\u00e4t Darmstadt. In: FlexiProvider, an open source Java Cryptographic Service Provider. 2001\u20132018, http:\/\/www.flexiprovider.de\/ Accessed 01 May 2019"},{"key":"1007_CR27","doi-asserted-by":"crossref","unstructured":"Yu Z., Au M.H., Yang R., Lai J., Xu Q.: Lattice-based universal accumulator with nonmembership arguments. In: ACISP, Wollongong, NSW, Australia, volume 10946 of Lecture Notes in Computer Science, pp 502\u2013519. Springer (2018)","DOI":"10.1007\/978-3-319-93638-3_29"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01007-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-022-01007-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01007-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,11]],"date-time":"2022-11-11T08:08:31Z","timestamp":1668154111000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-022-01007-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,31]]},"references-count":27,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["1007"],"URL":"https:\/\/doi.org\/10.1007\/s10623-022-01007-5","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,31]]},"assertion":[{"value":"28 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 January 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}