{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:34:34Z","timestamp":1774539274092,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T00:00:00Z","timestamp":1648857600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T00:00:00Z","timestamp":1648857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s10623-022-01027-1","type":"journal-article","created":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T14:21:42Z","timestamp":1648909302000},"page":"1157-1177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security"],"prefix":"10.1007","volume":"90","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7961-5750","authenticated-orcid":false,"given":"Fucai","family":"Luo","sequence":"first","affiliation":[]},{"given":"Saif","family":"Al-Kuwari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,2]]},"reference":[{"key":"1027_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal S., Boneh D., Boyen X.: Efficient lattice (H)IBE in the standard model. In: Advances in Cryptology\u2014EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco\/French Riviera, May 30\u2013June 3, 2010. Proceedings, pp. 553\u2013572 (2010).","DOI":"10.1007\/978-3-642-13190-5_28"},{"key":"1027_CR2","doi-asserted-by":"crossref","unstructured":"Ajtai M.: Generating hard instances of lattice problems (extended abstract). In: Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22\u201324, 1996, pp. 99\u2013108 (1996).","DOI":"10.1145\/237814.237838"},{"key":"1027_CR3","unstructured":"Banerjee A., Peikert C., Rosen A.: Pseudorandom functions and lattices. In: Pointcheval D., Johansson T. (eds.) Advances in Cryptology\u2014EUROCRYPT 2012\u201431st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings. Lecture Notes in Computer Science, vol. 7237, pp. 719\u2013737. Springer (2012)."},{"key":"1027_CR4","first-page":"823","volume":"2016","author":"RE Bansarkhani","year":"2016","unstructured":"Bansarkhani R.E., El Kaafarani A.: Post-quantum attribute-based signatures from lattice assumptions. IACR Cryptol. ePrint Arch. 2016, 823 (2016).","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"6","key":"1027_CR5","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1137\/0220068","volume":"20","author":"M Blum","year":"1991","unstructured":"Blum M., Santis A.D., Micali S., Persiano G.: Noninteractive zero-knowledge. SIAM J. Comput. 20(6), 1084\u20131118 (1991).","journal-title":"SIAM J. Comput."},{"key":"1027_CR6","doi-asserted-by":"crossref","unstructured":"Boneh D., Boyen X.: Secure identity based encryption without random oracles. In: Franklin M.K. (ed.) Advances in Cryptology\u2014CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15\u201319, 2004, Proceedings. Lecture Notes in Computer Science, vol. 3152, pp. 443\u2013459. Springer (2004).","DOI":"10.1007\/978-3-540-28628-8_27"},{"key":"1027_CR7","doi-asserted-by":"crossref","unstructured":"Boneh D., Gentry C., Gorbunov S., Halevi S., Nikolaenko V., Segev G., Vaikuntanathan V., Vinayagamurthy D.: Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. In: Advances in Cryptology\u2014EUROCRYPT 2014\u201433rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11\u201315, 2014. Proceedings, pp. 533\u2013556 (2014).","DOI":"10.1007\/978-3-642-55220-5_30"},{"key":"1027_CR8","doi-asserted-by":"crossref","unstructured":"Brakerski Z., Cash D., Tsabary R., Wee H.: Targeted homomorphic attribute-based encryption. In: Theory of Cryptography\u201414th International Conference, TCC 2016-B, Beijing, China, October 31\u2013November 3, 2016, Proceedings, Part II, pp. 330\u2013360 (2016).","DOI":"10.1007\/978-3-662-53644-5_13"},{"key":"1027_CR9","doi-asserted-by":"crossref","unstructured":"Brakerski Z., Langlois A., Peikert C., Regev O., Stehl\u00e9 D.: Classical hardness of learning with errors. In: Boneh D., Roughgarden T., Feigenbaum J. (eds.) Symposium on Theory of Computing Conference, STOC\u201913, Palo Alto, CA, USA, June 1\u20134, 2013, pp. 575\u2013584. ACM (2013).","DOI":"10.1145\/2488608.2488680"},{"key":"1027_CR10","doi-asserted-by":"crossref","unstructured":"Brakerski Z., Vaikuntanathan V.: Constrained key-homomorphic PRFs from standard lattice assumptions\u2014or: how to secretly embed a circuit in your PRF. In: Theory of Cryptography\u201412th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23\u201325, 2015, Proceedings, Part II, pp. 1\u201330 (2015).","DOI":"10.1007\/978-3-662-46497-7_1"},{"key":"1027_CR11","doi-asserted-by":"crossref","unstructured":"Brakerski Z., Vaikuntanathan V.: Circuit-abe from LWE: unbounded attributes and semi-adaptive security. In: Robshaw M., Katz J. (eds.) Advances in Cryptology\u2014CRYPTO 2016\u201436th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14\u201318, 2016, Proceedings, Part III. Lecture Notes in Computer Science, vol. 9816, pp. 363\u2013384. Springer (2016).","DOI":"10.1007\/978-3-662-53015-3_13"},{"key":"1027_CR12","doi-asserted-by":"crossref","unstructured":"Chen J., Wee H.: Semi-adaptive attribute-based encryption and improved delegation for Boolean formula. In: Abdalla M., Prisco R.D. (eds.) Security and Cryptography for Networks\u20149th International Conference, SCN 2014, Amalfi, Italy, September 3\u20135, 2014. Proceedings. Lecture Notes in Computer Science, vol. 8642, pp. 277\u2013297. Springer (2014).","DOI":"10.1007\/978-3-319-10879-7_16"},{"key":"1027_CR13","doi-asserted-by":"crossref","unstructured":"Datta P., Okamoto T., Takashima K.: Efficient attribute-based signatures for unbounded arithmetic branching programs. In: Lin D., Sako K. (eds.) Public-Key Cryptography\u2014PKC 2019\u201422nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14\u201317, 2019, Proceedings, Part I, Lecture Notes in Computer Science, vol. 11442, pp. 127\u2013158. Springer (2019).","DOI":"10.1007\/978-3-030-17253-4_5"},{"key":"1027_CR14","doi-asserted-by":"crossref","unstructured":"El Kaafarani, A., Katsumata, S.: Attribute-based signatures for unbounded circuits in the ROM and efficient instantiations from lattices. In: Abdalla M., Dahab R. (eds.) Public-Key Cryptography\u2014PKC 2018\u201421st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25\u201329, 2018, Proceedings, Part II. Lecture Notes in Computer Science, vol. 10770, pp. 89\u2013119. Springer (2018).","DOI":"10.1007\/978-3-319-76581-5_4"},{"key":"1027_CR15","doi-asserted-by":"crossref","unstructured":"Gentry C., Peikert C., Vaikuntanathan V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17\u201320, 2008, pp. 197\u2013206 (2008).","DOI":"10.1145\/1374376.1374407"},{"key":"1027_CR16","doi-asserted-by":"crossref","unstructured":"Gentry C., Sahai A., Waters B.: Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Advances in Cryptology\u2014CRYPTO 2013\u201433rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18\u201322, 2013. Proceedings, Part I, pp. 75\u201392 (2013).","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"1027_CR17","doi-asserted-by":"crossref","unstructured":"Gorbunov S., Vaikuntanathan V., Wichs D.: Leveled fully homomorphic signatures from standard lattices. In: Servedio R.A., Rubinfeld R. (eds.) Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC 2015, Portland, OR, USA, June 14\u201317, 2015, pp. 469\u2013477. ACM (2015).","DOI":"10.1145\/2746539.2746576"},{"key":"1027_CR18","doi-asserted-by":"crossref","unstructured":"Katsumata S., Yamada S.: Group signatures without NIZK: from lattices in the standard model. In: Ishai Y., Rijmen V. (eds.) Advances in Cryptology\u2014EUROCRYPT 2019\u201438th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19\u201323, 2019, Proceedings, Part III. Lecture Notes in Computer Science, vol. 11478, pp. 312\u2013344. Springer (2019).","DOI":"10.1007\/978-3-030-17659-4_11"},{"key":"1027_CR19","first-page":"328","volume":"2008","author":"HK Maji","year":"2008","unstructured":"Maji H.K., Prabhakaran M., Rosulek M.: Attribute-based signatures: achieving attribute-privacy and collusion-resistance. IACR Cryptol. ePrint Arch. 2008, 328 (2008).","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"1027_CR20","doi-asserted-by":"crossref","unstructured":"Maji H.K., Prabhakaran M., Rosulek M.: Attribute-based signatures. In: Kiayias A. (ed.) Topics in Cryptology\u2014CT-RSA 2011\u2014The Cryptographers\u2019 Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings. Lecture Notes in Computer Science, vol. 6558, pp. 376\u2013392. Springer (2011).","DOI":"10.1007\/978-3-642-19074-2_24"},{"key":"1027_CR21","doi-asserted-by":"crossref","unstructured":"Micciancio D., Peikert C.: Trapdoors for lattices: simpler, tighter, faster, smaller. In: Advances in Cryptology\u2014EUROCRYPT 2012\u201431st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15\u201319, 2012. Proceedings, pp. 700\u2013718 (2012).","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"1027_CR22","unstructured":"Micciancio D., Regev O.: Worst-case to average-case reductions based on Gaussian measures. In: 45th Symposium on Foundations of Computer Science (FOCS 2004), 17\u201319 October 2004, Rome, Italy, Proceedings, pp. 372\u2013381. IEEE Computer Society (2004)."},{"key":"1027_CR23","doi-asserted-by":"crossref","unstructured":"Okamoto T., Takashima K.: Decentralized attribute-based signatures. In: Kurosawa K., Hanaoka G. (eds.) Public-Key Cryptography\u2014PKC 2013\u201416th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26\u2013March 1, 2013. Proceedings. Lecture Notes in Computer Science, vol. 7778, pp. 125\u2013142. Springer (2013).","DOI":"10.1007\/978-3-642-36362-7_9"},{"key":"1027_CR24","doi-asserted-by":"crossref","unstructured":"Peikert C., Shiehian S.: Noninteractive zero knowledge for NP from (plain) learning with errors. In: Boldyreva A., Micciancio D. (eds.) Advances in Cryptology\u2014CRYPTO 2019\u201439th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18\u201322, 2019, Proceedings, Part I. Lecture Notes in Computer Science, vol. 11692, pp. 89\u2013114. Springer (2019).","DOI":"10.1007\/978-3-030-26948-7_4"},{"key":"1027_CR25","doi-asserted-by":"crossref","unstructured":"Sakai Y., Attrapadung N., Hanaoka G.: Attribute-based signatures for circuits from bilinear map. In: Cheng C., Chung K., Persiano G., Yang B. (eds.) Public-Key Cryptography\u2014PKC 2016\u201419th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6\u20139, 2016, Proceedings, Part I. Lecture Notes in Computer Science, vol. 9614, pp. 283\u2013300. Springer (2016).","DOI":"10.1007\/978-3-662-49384-7_11"},{"key":"1027_CR26","doi-asserted-by":"crossref","unstructured":"Shahandashti S.F., Safavi-Naini R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel B. (eds.) Progress in Cryptology\u2014AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21\u201325, 2009. Proceedings. Lecture Notes in Computer Science, vol. 5580, pp. 198\u2013216. Springer (2009).","DOI":"10.1007\/978-3-642-02384-2_13"},{"key":"1027_CR27","doi-asserted-by":"crossref","unstructured":"Tsabary R.: An equivalence between attribute-based signatures and homomorphic signatures, and new constructions for both. In: Kalai Y., Reyzin L. (eds.) Theory of Cryptography\u201415th International Conference, TCC 2017, Baltimore, MD, USA, November 12\u201315, 2017, Proceedings, Part II. Lecture Notes in Computer Science, vol. 10678, pp. 489\u2013518. Springer (2017).","DOI":"10.1007\/978-3-319-70503-3_16"},{"key":"1027_CR28","unstructured":"Waters B.: Efficient identity-based encryption without random oracles. In: Cramer R. (ed.) Advances in Cryptology\u2014EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22\u201326, 2005, Proceedings. Lecture Notes in Computer Science, vol. 3494, pp. 114\u2013127. Springer (2005)."},{"key":"1027_CR29","doi-asserted-by":"crossref","unstructured":"Yamada S.: Asymptotically compact adaptively secure lattice ibes and verifiable random functions via generalized partitioning techniques. In: Katz J., Shacham H. (eds.) Advances in Cryptology\u2014CRYPTO 2017\u201437th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III. Lecture Notes in Computer Science, vol. 10403, pp. 161\u2013193. Springer (2017).","DOI":"10.1007\/978-3-319-63697-9_6"},{"key":"1027_CR30","doi-asserted-by":"crossref","unstructured":"Zhang J., Chen Y., Zhang Z.: Programmable hash functions from lattices: short signatures and ibes with small key sizes. In: Robshaw M., Katz J. (eds.) Advances in Cryptology\u2014CRYPTO 2016\u201436th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14\u201318, 2016, Proceedings, Part III. Lecture Notes in Computer Science, vol. 9816, pp. 303\u2013332. Springer (2016).","DOI":"10.1007\/978-3-662-53015-3_11"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01027-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-022-01027-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01027-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T19:09:58Z","timestamp":1650913798000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-022-01027-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,2]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["1027"],"URL":"https:\/\/doi.org\/10.1007\/s10623-022-01027-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,2]]},"assertion":[{"value":"1 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}