{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T04:34:14Z","timestamp":1774586054271,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T00:00:00Z","timestamp":1666051200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T00:00:00Z","timestamp":1666051200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100019180","name":"HORIZON EUROPE European Research Council","doi-asserted-by":"publisher","award":["ERC-669891"],"award-info":[{"award-number":["ERC-669891"]}],"id":[{"id":"10.13039\/100019180","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s10623-022-01116-1","type":"journal-article","created":{"date-parts":[[2022,10,18]],"date-time":"2022-10-18T11:04:08Z","timestamp":1666091048000},"page":"563-608","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature"],"prefix":"10.1007","volume":"91","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9342-2859","authenticated-orcid":false,"given":"Thibauld","family":"Feneuil","sequence":"first","affiliation":[]},{"given":"Antoine","family":"Joux","sequence":"additional","affiliation":[]},{"given":"Matthieu","family":"Rivain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,18]]},"reference":[{"key":"1116_CR1","doi-asserted-by":"publisher","unstructured":"Abdalla M., An J.H., Bellare M., Namprempre C.: From identification to signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward-security. In: Knudsen L.R. (ed.) Advances in Cryptology\u2014EUROCRYPT\u00a02002. Lecture Notes in Computer Science, vol. 2332, pp. 418\u2013433. Springer, Amsterdam (2002). https:\/\/doi.org\/10.1007\/3-540-46035-7_28.","DOI":"10.1007\/3-540-46035-7_28"},{"key":"1116_CR2","doi-asserted-by":"publisher","unstructured":"Aguilar C., Gaborit P., Schrek J.: A new zero-knowledge code based identification scheme with reduced communication. In: 2011 IEEE Information Theory Workshop, pp. 648\u2013652 (2011). https:\/\/doi.org\/10.1109\/ITW.2011.6089577.","DOI":"10.1109\/ITW.2011.6089577"},{"key":"1116_CR3","unstructured":"Alaoui S.M.E.Y., Cayrel P., Bansarkhani R.E., Hoffmann G.: Code-based identification and signature schemes in software. In: Cuzzocrea A., Kittl C., Simos D.E., Weippl E.R., Xu L. (eds.) Security Engineering and Intelligence Informatics\u2014CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2\u20136, 2013. Proceedings. Lecture Notes in Computer Science, vol. 8128, pp. 122\u2013136. Springer, Berlin (2013)."},{"key":"1116_CR4","doi-asserted-by":"publisher","unstructured":"Albrecht M.R., Rechberger C., Schneider T., Tiessen T., Zohner M.: Ciphers for MPC and FHE. In: Oswald E., Fischlin M. (eds.) Advances in Cryptology\u2014EUROCRYPT\u00a02015, Part\u00a0I. Lecture Notes in Computer Science, vol. 9056, pp. 430\u2013454. Springer, Sofia (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_17.","DOI":"10.1007\/978-3-662-46800-5_17"},{"key":"1116_CR5","doi-asserted-by":"publisher","unstructured":"Aragon N., Blazy O., Gaborit P., Hauteville A., Z\u00e9mor G.: Durandal: a rank metric based signature scheme. In: Ishai Y., Rijmen V. (eds.) Advances in Cryptology\u2014EUROCRYPT\u00a02019, Part\u00a0III. Lecture Notes in Computer Science, vol. 11478, pp. 728\u2013758. Springer, Darmstadt (2019). https:\/\/doi.org\/10.1007\/978-3-030-17659-4_25.","DOI":"10.1007\/978-3-030-17659-4_25"},{"issue":"10","key":"1116_CR6","doi-asserted-by":"publisher","first-page":"209","DOI":"10.3390\/a12100209","volume":"12","author":"M Baldi","year":"2019","unstructured":"Baldi M., Barenghi A., Chiaraluce F., Pelosi G., Santini P.: A finite regime analysis of information set decoding algorithms. Algorithms 12(10), 209 (2019).","journal-title":"Algorithms"},{"key":"1116_CR7","doi-asserted-by":"publisher","unstructured":"Barenghi A., Biasse J.-F., Persichetti E., Santini P.: LESS-FM: Fine-tuning signatures from the code equivalence problem. In: Cheon J.H., Tillich J.P. (eds.) Post-Quantum Cryptography\u201412th International Workshop, PQCrypto 2021, pp. 23\u201343. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-81293-5_2.","DOI":"10.1007\/978-3-030-81293-5_2"},{"key":"1116_CR8","doi-asserted-by":"publisher","unstructured":"Baum C., de Saint Guilhem C., Kales D., Orsini E., Scholl P., Zaverucha G.: Banquet: short and fast signatures from AES. In: Garay J. (ed.) PKC\u00a02021: 24th International Conference on Theory and Practice of Public Key Cryptography, Part\u00a0I. Lecture Notes in Computer Science, vol. 12710, pp. 266\u2013297. Springer, Virtual Event (2021). https:\/\/doi.org\/10.1007\/978-3-030-75245-3_11.","DOI":"10.1007\/978-3-030-75245-3_11"},{"key":"1116_CR9","doi-asserted-by":"publisher","unstructured":"Becker A., Joux A., May A., Meurer A.: Decoding random binary linear codes in $$2^{n\/20}$$: How 1 + 1 = 0 improves information set decoding. In: Pointcheval D., Johansson T. (eds.) Advances in Cryptology\u2014EUROCRYPT\u00a02012. Lecture Notes in Computer Science, vol. 7237, pp. 520\u2013536. Springer, Cambridge (2012). https:\/\/doi.org\/10.1007\/978-3-642-29011-4_31.","DOI":"10.1007\/978-3-642-29011-4_31"},{"key":"1116_CR10","doi-asserted-by":"publisher","unstructured":"Bernstein D.J., H\u00fclsing A., K\u00f6lbl S., Niederhagen R., Rijneveld J., Schwabe P.: The SPHINCS$$^+$$ signature framework. In: Cavallaro L., Kinder J., Wang X., Katz J. (eds.) ACM CCS 2019: 26th Conference on Computer and Communications Security, pp. 2129\u20132146. ACM Press, London (2019). https:\/\/doi.org\/10.1145\/3319535.3363229.","DOI":"10.1145\/3319535.3363229"},{"key":"1116_CR11","doi-asserted-by":"publisher","unstructured":"Beullens W.: Sigma protocols for MQ, PKP and SIS, and Fishy signature schemes. In: Canteaut A., Ishai Y. (eds.) Advances in Cryptology\u2014EUROCRYPT\u00a02020, Part\u00a0III. Lecture Notes in Computer Science, vol. 12107, pp. 183\u2013211. Springer, Zagreb (2020). https:\/\/doi.org\/10.1007\/978-3-030-45727-3_7.","DOI":"10.1007\/978-3-030-45727-3_7"},{"key":"1116_CR12","doi-asserted-by":"publisher","unstructured":"Biasse J.-F., Micheli G., Persichetti E., Santini P.: LESS is more: code-based signatures without syndromes. In: Nitaj A., Youssef A.M. (eds.) AFRICACRYPT 20: 12th International Conference on Cryptology in Africa. Lecture Notes in Computer Science, vol. 12174, pp. 45\u201365. Springer, Cairo (2020). https:\/\/doi.org\/10.1007\/978-3-030-51938-4_3.","DOI":"10.1007\/978-3-030-51938-4_3"},{"key":"1116_CR13","unstructured":"Chailloux A.: On the (In)security of optimized Stern-like signature schemes. In: WCC 2022: The Twelfth International Workshop on Coding and Cryptography. https:\/\/www.wcc2022.uni-rostock.de\/storages\/uni-rostock\/Tagungen\/WCC2022\/Papers\/WCC_2022_paper_54.pdf."},{"key":"1116_CR14","unstructured":"Chase M., Derler D., Goldfeder S., Katz J., Kolesnikov V., Orlandi C., Ramacher S., Rechberger C., Slamanig D., Wang X., Zaverucha G.: The picnic signature scheme\u2014design document. Version 2.2\u201414 April 2020. https:\/\/raw.githubusercontent.com\/microsoft\/Picnic\/master\/spec\/design-v2.2.pdf."},{"key":"1116_CR15","doi-asserted-by":"publisher","unstructured":"de Saint Guilhem C., De Meyer L., Orsini E., Smart N.P.: BBQ: using AES in picnic signatures. In: Paterson K.G., Stebila D. (eds.) SAC 2019: 26th Annual International Workshop on Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 11959, pp. 669\u2013692. Springer, Waterloo (2019). https:\/\/doi.org\/10.1007\/978-3-030-38471-5_27.","DOI":"10.1007\/978-3-030-38471-5_27"},{"key":"1116_CR16","doi-asserted-by":"publisher","unstructured":"Debris-Alazard T., Sendrier N., Tillich J.-P.: Wave: a new family of trapdoor one-way preimage sampleable functions based on codes. In: Galbraith, S.D., Moriai, S. (eds.) Advances in Cryptology\u2014ASIACRYPT\u00a02019, Part\u00a0I. Lecture Notes in Computer Science, vol. 11921, pp. 21\u201351. Springer, Kobe (2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_2.","DOI":"10.1007\/978-3-030-34578-5_2"},{"key":"1116_CR17","doi-asserted-by":"crossref","unstructured":"Feneuil T., Joux A., Rivain M.: Syndrome decoding in the head: shorter signatures from zero-knowledge proofs. Cryptology ePrint Archive, Report 2022\/188 (2022). https:\/\/eprint.iacr.org\/2022\/188.","DOI":"10.1007\/978-3-031-15979-4_19"},{"key":"1116_CR18","doi-asserted-by":"publisher","unstructured":"Fiat A., Shamir A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko A.M. (ed.) Advances in Cryptology\u2014CRYPTO\u201986. Lecture Notes in Computer Science, vol. 263, pp. 186\u2013194. Springer, Santa Barbara (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12.","DOI":"10.1007\/3-540-47721-7_12"},{"key":"1116_CR19","doi-asserted-by":"crossref","unstructured":"Gaborit P., Girault M.: Lightweight code-based identification and signature. In: IEEE International Symposium on Information Theory, ISIT 2007, Nice, France, June 24\u201329, 2007, pp. 191\u2013195. IEEE (2007).","DOI":"10.1109\/ISIT.2007.4557225"},{"key":"1116_CR20","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography6010005","author":"S Gueron","year":"2022","unstructured":"Gueron S., Persichetti E., Santini P.: Designing a practical code-based signature scheme from zero-knowledge proofs with trusted setup. Cryptography (2022). https:\/\/doi.org\/10.3390\/cryptography6010005.","journal-title":"Cryptography"},{"key":"1116_CR21","doi-asserted-by":"publisher","unstructured":"Ishai Y., Kushilevitz E., Ostrovsky R., Sahai A.: Zero-knowledge from secure multiparty computation. In: Johnson D.S., Feige U. (eds.) 39th Annual ACM Symposium on Theory of Computing, pp. 21\u201330. ACM Press, San Diego (2007). https:\/\/doi.org\/10.1145\/1250790.1250794.","DOI":"10.1145\/1250790.1250794"},{"key":"1116_CR22","doi-asserted-by":"publisher","unstructured":"Kales D., Zaverucha G.: An attack on some signature schemes constructed from five-pass identification schemes. In: Krenn S., Shulman H., Vaudenay S. (eds.) CANS 20: 19th International Conference on Cryptology and Network Security. Lecture Notes in Computer Science, vol. 12579, pp. 3\u201322. Springer, Vienna. (2020). https:\/\/doi.org\/10.1007\/978-3-030-65411-5_1.","DOI":"10.1007\/978-3-030-65411-5_1"},{"key":"1116_CR23","doi-asserted-by":"publisher","first-page":"154","DOI":"10.46586\/tches.v2020.i4.154-188","volume":"4","author":"D Kales","year":"2020","unstructured":"Kales D., Zaverucha G.: Improving the performance of the Picnic signature scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 4, 154\u2013188 (2020).","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"1116_CR24","doi-asserted-by":"publisher","unstructured":"Katz J., Kolesnikov V., Wang X.: Improved non-interactive zero knowledge with applications to post-quantum signatures. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) ACM CCS 2018: 25th Conference on Computer and Communications Security, pp. 525\u2013537. ACM Press, Toronto (2018). https:\/\/doi.org\/10.1145\/3243734.3243805.","DOI":"10.1145\/3243734.3243805"},{"key":"1116_CR25","doi-asserted-by":"publisher","unstructured":"Lyubashevsky V.: Fiat-Shamir with aborts: applications to lattice and factoring-based signatures. In: Matsui M. (ed.) Advances in Cryptology\u2014ASIACRYPT\u00a02009. Lecture Notes in Computer Science, vol. 5912, pp. 598\u2013616. Springer, Tokyo (2009). https:\/\/doi.org\/10.1007\/978-3-642-10366-7_35.","DOI":"10.1007\/978-3-642-10366-7_35"},{"key":"1116_CR26","doi-asserted-by":"publisher","unstructured":"May A., Meurer A., Thomae E.: Decoding random linear codes in $$\\tilde{\\cal{O}}(2^{0.054n})$$. In: Lee D.H., Wang X. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02011. Lecture Notes in Computer Science, vol. 7073, pp. 107\u2013124. Springer, Seoul (2011). https:\/\/doi.org\/10.1007\/978-3-642-25385-0_6.","DOI":"10.1007\/978-3-642-25385-0_6"},{"issue":"3","key":"1116_CR27","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D., Stern J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000). https:\/\/doi.org\/10.1007\/s001450010003.","journal-title":"J. Cryptol."},{"key":"1116_CR28","doi-asserted-by":"publisher","unstructured":"Schnorr C.-P.: Efficient identification and signatures for smart cards. In: Brassard G. (ed.) Advances in Cryptology\u2014CRYPTO\u201989. Lecture Notes in Computer Science, vol. 435, pp. 239\u2013252. Springer, Santa Barbara (1990). https:\/\/doi.org\/10.1007\/0-387-34805-0_22.","DOI":"10.1007\/0-387-34805-0_22"},{"key":"1116_CR29","doi-asserted-by":"publisher","unstructured":"Shor P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE Computer Society Press, Santa Fe, NM, USA (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700.","DOI":"10.1109\/SFCS.1994.365700"},{"key":"1116_CR30","doi-asserted-by":"publisher","unstructured":"Stern J.: A new identification scheme based on syndrome decoding. In: Stinson, D.R. (ed.) Advances in Cryptology\u2014CRYPTO\u201993. Lecture Notes in Computer Science, vol. 773, pp. 13\u201321. Springer, Santa Barbara, CA, USA (1994). https:\/\/doi.org\/10.1007\/3-540-48329-2_2.","DOI":"10.1007\/3-540-48329-2_2"},{"key":"1116_CR31","doi-asserted-by":"publisher","unstructured":"Torres R.C., Sendrier N.: Analysis of information set decoding for a sub-linear error weight. In: Takagi T. (ed.) Post-Quantum Cryptography\u20147th International Workshop, PQCrypto 2016, pp. 144\u2013161. Springer, Fukuoka (2016). https:\/\/doi.org\/10.1007\/978-3-319-29360-8_10.","DOI":"10.1007\/978-3-319-29360-8_10"},{"issue":"1","key":"1116_CR32","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s002000050053","volume":"8","author":"P V\u00e9ron","year":"1996","unstructured":"V\u00e9ron P.: Improved identification schemes based on error-correcting codes. Appl. Algebra Eng. Commun. Comput. 8(1), 57\u201369 (1996).","journal-title":"Appl. Algebra Eng. Commun. Comput."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01116-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-022-01116-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-022-01116-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T06:50:24Z","timestamp":1676011824000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-022-01116-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,18]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["1116"],"URL":"https:\/\/doi.org\/10.1007\/s10623-022-01116-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,18]]},"assertion":[{"value":"16 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}