{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:33:30Z","timestamp":1761294810444,"version":"3.40.5"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"PEPR PQ-TLS","award":["ANR-22-PETQ-0008","ANR-22-PETQ-0008","ANR-22-PETQ-0008","ANR-22-PETQ-0008"],"award-info":[{"award-number":["ANR-22-PETQ-0008","ANR-22-PETQ-0008","ANR-22-PETQ-0008","ANR-22-PETQ-0008"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s10623-024-01544-1","type":"journal-article","created":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T06:53:49Z","timestamp":1735973629000},"page":"1451-1486","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["RYDE: a digital signature scheme based on rank syndrome decoding problem with MPC-in-the-Head paradigm"],"prefix":"10.1007","volume":"93","author":[{"given":"Lo\u00efc","family":"Bidoux","sequence":"first","affiliation":[]},{"given":"Jes\u00fas-Javier","family":"Chi-Dom\u00ednguez","sequence":"additional","affiliation":[]},{"given":"Thibauld","family":"Feneuil","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Gaborit","sequence":"additional","affiliation":[]},{"given":"Antoine","family":"Joux","sequence":"additional","affiliation":[]},{"given":"Matthieu","family":"Rivain","sequence":"additional","affiliation":[]},{"given":"Adrien","family":"Vin\u00e7otte","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,4]]},"reference":[{"key":"1544_CR1","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/3-540-46035-7_28","volume-title":"Advances in Cryptology\u2013EUROCRYPT 2002","author":"M Abdalla","year":"2002","unstructured":"Abdalla M., An J.H., Bellare M., Namprempre C.: From identification to signatures via the Fiat-Shamir transform: minimizing assumptions for security and forward-security. In: Knudsen L.R. (ed.) Advances in Cryptology\u2013EUROCRYPT 2002, pp. 418\u2013433. Springer, Berlin (2002)."},{"key":"1544_CR2","unstructured":"Aaraj N., Bettaieb S., Bidoux L., Budroni A., Dyseryn V., Esser A., Gaborit P., Kulkarni M., Mateu V., Palumbi M., Perin L., Tillich J.-P.: PERK (2023). https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/round-1\/spec-files\/PERK-spec-web.pdf."},{"key":"1544_CR3","unstructured":"Aragon N., Bardet M., Bidoux L., Chi-Dom\u00ednguez J.-J., Dyseryn V., Feneuil T., Gaborit P., Joux A., Neveu R., Tillich J.-P., Rivain M.: MIRA specifications (2023). https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/round-1\/spec-files\/MIRA-spec-web.pdf."},{"key":"1544_CR4","unstructured":"Aragon N., Bardet M., Bidoux L., Chi-Dom\u00ednguez J.-J., Dyseryn V., Feneuil T., Gaborit P., Joux A., Neveu R., Tillich J.-P., Rivain M., Vin\u00e7otte A.: RYDE specifications (2023). https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/round-1\/spec-files\/ryde-spec-web.pdf."},{"key":"1544_CR5","unstructured":"Aragon N., Bardet M., Bidoux L., Chi-Dom\u00ednguez J.-J., Dyseryn V., Feneuil T., Gaborit P., Joux A., Tillich J.-P., Rivain M., Adrien Vin\u00e7otte. RYDE specifications (2023)."},{"key":"1544_CR6","unstructured":"Attema T., Fehr S., Kloo\u00df, M.: Fiat\u2013Shamir transformation of multi-round interactive proofs. Cryptology ePrint Archive, Paper 2021\/1377 (2021). https:\/\/eprint.iacr.org\/2021\/1377."},{"key":"1544_CR7","unstructured":"Melchor C.A., Aragon, N., Bettaieb S., Bidoux L., Blazy O., Bros M., Couvreur A., Deneuville J.-C., Gaborit P., Hauteville A., Z\u00e9mor G.: Rank Quasi-Cyclic (RQC). In: NIST Post-Quantum Cryptography Standardization Project (Round 2) (2020). https:\/\/pqc-rqc.org."},{"key":"1544_CR8","unstructured":"Melchor C.A.,, Feneuil T., Gama N., Gueron S., Howe J., Joseph D., Joux A., Persichetti E., Randrianarisoa T.H., Rivain M., Yue D.: The syndrome decoding in the head (SD-in-the-Head) signature scheme (2023). https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/round-1\/spec-files\/SDitH-spec-web.pdf."},{"key":"1544_CR9","unstructured":"Melchor C.A., Gama N., Howe J., H\u00fclsing A., Joseph D., Yue D.: The return of the SDitH. Cryptology ePrint Archive, Report 2022\/1645 (2022)."},{"key":"1544_CR10","unstructured":"Adj G., Rivera-Zamarripa L., Verbel J., Bellini E., Stefano B., Esser A., Sanna C., Zweydinger F.: MiRitH specifications (2023). https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/round-1\/spec-files\/MiRitH-spec-web.pdf."},{"key":"1544_CR11","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-030-45727-3_3","volume-title":"Advances in Cryptology\u2013EUROCRYPT 2020","author":"M Bardet","year":"2020","unstructured":"Bardet M., Briaud P., Bros M., Gaborit P., Neiger V., Ruatta O., Tillich J.-P.: An algebraic attack on rank metric code-based cryptosystems. In: Canteaut A., Ishai Y. (eds.) Advances in Cryptology\u2013EUROCRYPT 2020, pp. 64\u201393. Springer, Cham (2020)."},{"key":"1544_CR12","doi-asserted-by":"crossref","unstructured":"Bardet M., Briaud P., Bros M., Gaborit P., Tillich J.-P.: Revisiting algebraic attacks on MinRank and on the rank decoding problem (2022).","DOI":"10.1007\/s10623-023-01265-x"},{"key":"1544_CR13","doi-asserted-by":"crossref","unstructured":"Bardet M., Bros M., Cabarcas D., Gaborit P., Perlner R., Smith-Tone D., Tillich J.-P., Verbel J.: Improvements of algebraic attacks for solving the rank decoding and MinRank problems. In: Advances in Cryptology\u2014ASIACRYPT 2020, International Conference on the Theory and Application of Cryptology and Information Security, 2020. Proceedings, pp. 507\u2013536 (2020).","DOI":"10.1007\/978-3-030-64837-4_17"},{"key":"1544_CR14","doi-asserted-by":"crossref","unstructured":"Bidoux L., Gaborit P.: Compact post-quantum signatures from proofs of knowledge leveraging structure for the PKP, SD and RSD Problems. arXiv Preprint (2022). 2204.02915.","DOI":"10.1007\/978-3-031-33017-9_2"},{"key":"1544_CR15","unstructured":"Bettale L., Kahrobaei D., Perret L., Verbel, J.: Biscuit: Shorter MPC-based signature from Posso (2023). https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/round-1\/spec-files\/Biscuit-spec-web.pdf."},{"key":"1544_CR16","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-030-45374-9_17","volume-title":"Public-Key Cryptography\u2013PKC 2020","author":"C Baum","year":"2020","unstructured":"Baum C., Nof A.: Concretely-efficient zero-knowledge arguments for arithmetic circuits and their application to lattice-based cryptography. In: Kiayias A., Kohlweiss M., Wallden P., Zikas V. (eds.) Public-Key Cryptography\u2013PKC 2020, pp. 495\u2013526. Springer, Cham (2020)."},{"key":"1544_CR17","unstructured":"Feneuil T.: Building MPCitH-based signatures from MQ, MinRank, Rank SD and PKP. Cryptology ePrint Archive, Report 2022\/1512 (2022)."},{"key":"1544_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-022-01116-1","author":"T Feneuil","year":"2021","unstructured":"Feneuil T., Joux A., Rivain M.: Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature. Des. Codes Cryptogr. (2021). https:\/\/doi.org\/10.1007\/s10623-022-01116-1.","journal-title":"Des. Codes Cryptogr."},{"key":"1544_CR19","doi-asserted-by":"crossref","unstructured":"Feneuil T., Joux A., Rivain M.: Syndrome decoding in the head: shorter signatures from zero-knowledge proofs. In: Annual International Cryptology Conference (CRYPTO) (2022).","DOI":"10.1007\/978-3-031-15979-4_19"},{"key":"1544_CR20","doi-asserted-by":"crossref","unstructured":"Feneuil T., Joux A., Rivain M.: Threshold linear secret sharing to the rescue of MPC-in-the-head. Cryptology ePrint Archive, Paper 2022\/1407 (2022).","DOI":"10.1007\/978-981-99-8721-4_14"},{"key":"1544_CR21","unstructured":"Feneuil T., Rivain M.: MQOM: MQ on my mind (2023). https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/round-1\/spec-files\/MQOM-spec-web.pdf."},{"key":"1544_CR22","unstructured":"Fiat A., Shamir A.: How to prove yourself: practical solutions to identification and signature problems. In: International Cryptology Conference (CRYPTO) (1986)."},{"issue":"1","key":"1544_CR23","first-page":"3","volume":"21","author":"EM Gabidulin","year":"1985","unstructured":"Gabidulin E.M.: Theory of codes with maximum rank distance. Problemy peredachi informatsii 21(1), 3\u201316 (1985).","journal-title":"Problemy peredachi informatsii"},{"issue":"4","key":"1544_CR24","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O Goldreich","year":"1986","unstructured":"Goldreich O., Goldwasser S.: Micali S: How to construct random functions. J. ACM 33(4), 792\u2013807 (1986).","journal-title":"J. ACM"},{"key":"1544_CR25","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-25405-5_3","volume-title":"Post-Quantum Cryptography","author":"P Gaborit","year":"2011","unstructured":"Gaborit P., Schrek J., Z\u00e9mor G.: Full cryptanalysis of the Chen identification protocol. In: Yang B.-Y. (ed.) Post-Quantum Cryptography, pp. 35\u201350. Springer, Berlin (2011)."},{"key":"1544_CR26","doi-asserted-by":"crossref","unstructured":"Ishai Y., Kushilevitz E., Ostrovsky R., Sahai A.: Zero-knowledge from secure multiparty computation. In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC) (2007).","DOI":"10.1145\/1250790.1250794"},{"key":"1544_CR27","doi-asserted-by":"crossref","unstructured":"Katz J., Kolesnikov V., Wang X.: Improved non-interactive zero knowledge with applications to post-quantum signatures. In: Proceedings of the 2018 ACM Conference on Computer and Communications Security (CCS) (2018).","DOI":"10.1145\/3243734.3243805"},{"key":"1544_CR28","doi-asserted-by":"crossref","unstructured":"Kales D., Zaverucha G.: An attack on some signature schemes constructed from five-pass identification schemes. In: International Conference on Cryptology and Network Security (CANS) (2020).","DOI":"10.1007\/978-3-030-65411-5_1"},{"key":"1544_CR29","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology\u2013CRYPTO \u201987","author":"RC Merkle","year":"1988","unstructured":"Merkle R.C.: A digital signature based on a conventional encryption function. In: Pomerance C. (ed.) Advances in Cryptology\u2013CRYPTO \u201987, pp. 369\u2013378. Springer, Berlin (1988)."},{"issue":"3","key":"1544_CR30","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1090\/S0002-9947-1933-1501703-0","volume":"35","author":"O Ore","year":"1933","unstructured":"Ore O.: On a special class of polynomials. Trans. Am. Math. Soc. 35(3), 559\u2013584 (1933).","journal-title":"Trans. Am. Math. Soc."},{"issue":"3","key":"1544_CR31","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s001450010003","volume":"13","author":"D Pointcheval","year":"2000","unstructured":"Pointcheval D.: Stern J: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361\u2013396 (2000).","journal-title":"J. Cryptol."},{"key":"1544_CR32","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1007\/0-387-34805-0_54","volume-title":"Advances in Cryptology\u2013CRYPTO\u2019 89 Proceedings","author":"A Shamir","year":"1990","unstructured":"Shamir A.: An efficient identification scheme based on permuted kernels (extended abstract). In: Brassard G. (ed.) Advances in Cryptology\u2013CRYPTO\u2019 89 Proceedings, pp. 606\u2013609. Springer, New York (1990)."},{"key":"1544_CR33","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1007\/978-3-642-22792-9_40","volume-title":"Advances in Cryptology\u2013CRYPTO 2011","author":"K Sakumoto","year":"2011","unstructured":"Sakumoto K., Shirai T., Hiwatari H.: Public-key identification schemes based on multivariate quadratic polynomials. In: Rogaway P. (ed.) Advances in Cryptology\u2013CRYPTO 2011, pp. 706\u2013723. Springer, Berlin (2011)."},{"key":"1544_CR34","doi-asserted-by":"crossref","unstructured":"Stern J.: A new identification scheme based on syndrome decoding. In: International Cryptology Conference (CRYPTO) (1993).","DOI":"10.1007\/3-540-48329-2_2"},{"key":"1544_CR35","unstructured":"Unruh D.: Non-interactive zero-knowledge proofs in the quantum random oracle model. Cryptology ePrint Archive, Paper 2014\/587 (2014). https:\/\/eprint.iacr.org\/2014\/587."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-024-01544-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-024-01544-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-024-01544-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T17:46:54Z","timestamp":1746640014000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-024-01544-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,4]]},"references-count":35,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1544"],"URL":"https:\/\/doi.org\/10.1007\/s10623-024-01544-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2025,1,4]]},"assertion":[{"value":"11 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}