{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T11:16:04Z","timestamp":1773659764314,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T00:00:00Z","timestamp":1773619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["Grant No. 62172182"],"award-info":[{"award-number":["Grant No. 62172182"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Hunan Provincial Natural Science Foundation of China","award":["Grant Nos. 2025JJ70445"],"award-info":[{"award-number":["Grant Nos. 2025JJ70445"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05121-4","type":"journal-article","created":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:26:34Z","timestamp":1773656794000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum linkable threshold ring signature in the quantum random oracle model"],"prefix":"10.1007","volume":"25","author":[{"given":"Sihai","family":"Liu","sequence":"first","affiliation":[]},{"given":"Rongbo","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Lan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,16]]},"reference":[{"key":"5121_CR1","doi-asserted-by":"crossref","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Advances in Cryptology\u2013ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9\u201313, 2001 Proceedings 7, pp. 552\u2013565. Springer (2001)","DOI":"10.1007\/3-540-45682-1_32"},{"key":"5121_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2022.102786","volume":"134","author":"J Odoom","year":"2023","unstructured":"Odoom, J., Huang, X., Zhou, Z., Danso, S., Zheng, J., Xiang, Y.: Linked or unlinked: a systematic review of linkable ring signature schemes. J. Syst. Architect. 134, 102786 (2023)","journal-title":"J. Syst. Architect."},{"key":"5121_CR3","doi-asserted-by":"crossref","unstructured":"Liu, J.K., Wei, V.K., Wong, D.S.: Linkable spontaneous anonymous group signature for ad hoc groups. In: Australasian Conference on Information Security and Privacy, pp. 325\u2013335. Springer (2004)","DOI":"10.1007\/978-3-540-27800-9_28"},{"issue":"1","key":"5121_CR4","first-page":"1417607","volume":"2022","author":"W Li","year":"2022","unstructured":"Li, W., Lin, Z., Chen, Q.: A hybrid design of linkable ring signature scheme with stealth addresses. Secur. Commun. Netw. 2022(1), 1417607 (2022)","journal-title":"Secur. Commun. Netw."},{"key":"5121_CR5","doi-asserted-by":"crossref","unstructured":"Hui, X., Chau, S.C.-K.: Llring: logarithmic linkable ring signatures with transparent setup. In: European Symposium on Research in Computer Security, pp. 299\u2013319. Springer (2024)","DOI":"10.1007\/978-3-031-70896-1_15"},{"key":"5121_CR6","doi-asserted-by":"crossref","unstructured":"Xue, Y., Lu, X., Au, M.H., Zhang, C.: Efficient linkable ring signatures: new framework and post-quantum instantiations. In: European Symposium on Research in Computer Security, pp. 435\u2013456. Springer (2024)","DOI":"10.1007\/978-3-031-70903-6_22"},{"key":"5121_CR7","doi-asserted-by":"crossref","unstructured":"Bresson, E., Stern, J., Szydlo, M.: Threshold ring signatures and applications to ad-hoc groups. In: Annual International Cryptology Conference, pp. 465\u2013480. Springer (2002)","DOI":"10.1007\/3-540-45708-9_30"},{"key":"5121_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2020.103489","volume":"74","author":"DH Duong","year":"2021","unstructured":"Duong, D.H., Tran, H.T., Susilo, W., Van Luyen, L.: An efficient multivariate threshold ring signature scheme. Comput. Standards Interfaces 74, 103489 (2021)","journal-title":"Comput. Standards Interfaces"},{"issue":"5","key":"5121_CR9","doi-asserted-by":"publisher","first-page":"5014","DOI":"10.1109\/TDSC.2024.3367888","volume":"21","author":"J Duan","year":"2024","unstructured":"Duan, J., Zheng, S., Wang, W., Wang, L., Hu, X., Gu, L.: Concise ringct protocol based on linkable threshold ring signature. IEEE Trans. Dependable Secure Comput. 21(5), 5014\u20135028 (2024)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"5121_CR10","doi-asserted-by":"crossref","unstructured":"Avitabile, G., Botta, V., Fiore, D.: Extendable threshold ring signatures with enhanced anonymity. In: IACR International Conference on Public-Key Cryptography, pp. 281\u2013311. Springer (2023)","DOI":"10.1007\/978-3-031-31368-4_11"},{"key":"5121_CR11","doi-asserted-by":"crossref","unstructured":"Khuc, X.T., Susilo, W., Duong, D.H., Guo, F., Fukushima, K., Kiyomoto, S.: Threshold ring signatures with accountability. In: Australasian Conference on Information Security and Privacy, pp. 368\u2013388. Springer (2024)","DOI":"10.1007\/978-981-97-5025-2_19"},{"key":"5121_CR12","unstructured":"Reich, E.: Deniable ring signatures. PhD thesis, Massachusetts Institute of Technology (2007)"},{"key":"5121_CR13","doi-asserted-by":"crossref","unstructured":"Komano, Y., Ohta, K., Shimbo, A., Kawamura, S.: Toward the fair anonymous signatures: Deniable ring signatures. In: Cryptographers\u2019 Track at the RSA Conference, pp. 174\u2013191. Springer (2006)","DOI":"10.1007\/11605805_12"},{"key":"5121_CR14","doi-asserted-by":"crossref","unstructured":"Haque, A., Krenn, S., Slamanig, D., Striecks, C.: Logarithmic-size (linkable) threshold ring signatures in the plain model. In: IACR International Conference on Public-Key Cryptography, pp. 437\u2013467. Springer (2022)","DOI":"10.1007\/978-3-030-97131-1_15"},{"key":"5121_CR15","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"5121_CR16","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv preprint arXiv:quant-ph\/0105032 (2001)"},{"issue":"4","key":"5121_CR17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"G Zeng","year":"2002","unstructured":"Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"5121_CR18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.82.042325","volume":"82","author":"X Zou","year":"2010","unstructured":"Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A-Atom. Mol. Opt. Phys. 82(4), 042325 (2010)","journal-title":"Phys. Rev. A-Atom. Mol. Opt. Phys."},{"key":"5121_CR19","unstructured":"Arrazola, J.M., Wallden, P., Andersson, E.: Multiparty quantum signature schemes. arXiv:1505.07509 (2015)"},{"issue":"9","key":"5121_CR20","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/acac0a","volume":"32","author":"Y Zhang","year":"2023","unstructured":"Zhang, Y., Liu, F., Zuo, H.: Improved quantum (t, n) threshold group signature. Chin. Phys. B 32(9), 090308 (2023)","journal-title":"Chin. Phys. B"},{"issue":"3","key":"5121_CR21","doi-asserted-by":"publisher","DOI":"10.1088\/1612-202X\/ad1f50","volume":"21","author":"F Tian","year":"2024","unstructured":"Tian, F., Lu, D., Wang, C., Yao, W.: A public-key quantum group blind signature scheme based on single-qubit rotations. Laser Phys. Lett. 21(3), 035204 (2024)","journal-title":"Laser Phys. Lett."},{"key":"5121_CR22","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1007\/s10773-021-04777-1","volume":"60","author":"C Qiu","year":"2021","unstructured":"Qiu, C., Zhang, S., Chang, Y., Huang, X., Chen, H.: Electronic voting scheme based on a quantum ring signature. Int. J. Theor. Phys. 60, 1550\u20131555 (2021)","journal-title":"Int. J. Theor. Phys."},{"key":"5121_CR23","doi-asserted-by":"crossref","unstructured":"Wang, H., Yao, G., Wang, B.: A quantum ring signature scheme based on the quantum finite automata signature scheme. In: 2021 IEEE 15th International Conference on Anti-counterfeiting, Security, and Identification (ASID), pp. 135\u2013139. IEEE (2021)","DOI":"10.1109\/ASID52932.2021.9651720"},{"issue":"40","key":"5121_CR24","doi-asserted-by":"publisher","first-page":"2350175","DOI":"10.1142\/S0217732323501754","volume":"38","author":"X-J Wei","year":"2023","unstructured":"Wei, X.-J., Lu, D.-J., Luo, S.-S., Li, Z.-H.: A novel quantum ring signature based on secret sharing. Mod. Phys. Lett. A 38(40), 2350175 (2023)","journal-title":"Mod. Phys. Lett. A"},{"issue":"4","key":"5121_CR25","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/s11128-022-03481-1","volume":"21","author":"Z Xiong","year":"2022","unstructured":"Xiong, Z., Yin, A.: A novel quantum ring signature scheme without using entangled states. Quantum Inf. Process. 21(4), 140 (2022)","journal-title":"Quantum Inf. Process."},{"key":"5121_CR26","doi-asserted-by":"crossref","unstructured":"Boneh, D., Dagdelen, \u00d6., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41\u201369. Springer (2011)","DOI":"10.1007\/978-3-642-25385-0_3"},{"issue":"04","key":"5121_CR27","doi-asserted-by":"publisher","first-page":"1550014","DOI":"10.1142\/S0219749915500148","volume":"13","author":"M Zhandry","year":"2015","unstructured":"Zhandry, M.: Secure identity-based encryption in the quantum random oracle model. Int. J. Quantum In. 13(04), 1550014 (2015)","journal-title":"Int. J. Quantum In."},{"issue":"4","key":"5121_CR28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.94.042314","volume":"94","author":"T Shang","year":"2016","unstructured":"Shang, T., Lei, Q., Liu, J.: Quantum random oracle model for quantum digital signature. Phys. Rev. A 94(4), 042314 (2016)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"5121_CR29","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11128-024-04257-5","volume":"23","author":"T Zhang","year":"2024","unstructured":"Zhang, T., Xin, X., Sun, L., Li, C., Li, F.: Secure quantum signature scheme without entangled state. Quantum Inf. Process. 23(2), 49 (2024)","journal-title":"Quantum Inf. Process."},{"key":"5121_CR30","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s11128-025-04972-7","volume":"24","author":"H Liu","year":"2025","unstructured":"Liu, H., Xin, X., Han, Y., Gong, L., Li, C.: Quantum signature with formal security proof. Quantum Inf. Process. 24, 353 (2025)","journal-title":"Quantum Inf. Process."},{"issue":"11","key":"5121_CR31","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"5121_CR32","doi-asserted-by":"publisher","first-page":"130024","DOI":"10.1109\/ACCESS.2019.2940406","volume":"7","author":"T Shang","year":"2019","unstructured":"Shang, T., Chen, R., Lei, Q.: Quantum random oracle model for quantum public-key encryption. IEEE Access 7, 130024\u2013130031 (2019)","journal-title":"IEEE Access"},{"key":"5121_CR33","doi-asserted-by":"publisher","unstructured":"Zhandry, M.: How to construct quantum random functions. In: 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, pp. 679\u2013687 (2012). https:\/\/doi.org\/10.1109\/FOCS.2012.37","DOI":"10.1109\/FOCS.2012.37"},{"key":"5121_CR34","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. Theoret. Comput. Sci. 560, 7\u201311 (2014)","journal-title":"Theoret. Comput. Sci."},{"key":"5121_CR35","unstructured":"European Telecommunications Standards Institute (ETSI): Quantum Key Distribution (QKD); Application Interface. Technical Report ETSI GS QKD 004 V1.1.1, ETSI (2020). Standard. https:\/\/www.etsi.org\/deliver\/etsi_gs\/QKD\/001_099\/004\/01.01.01_60\/gs_qkd004v010101p.pdf Accessed 2025-10-04"},{"key":"5121_CR36","unstructured":"Gueron, S., Langley, A., Lindell, Y.: AES-GCM-SIV: specification and analysis. Cryptology ePrint Archive (2017)"},{"issue":"26","key":"5121_CR37","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85(26), 5635 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"5121_CR38","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s11128-023-04087-x","volume":"22","author":"R-Z He","year":"2023","unstructured":"He, R.-Z., Li, Z.-Z., Wang, Q.-H., Li, Y.-J., Li, Z.-C.: Semi-quantum ring signature protocol based on multi-particle GHZ state. Quantum Inf. Process. 22(9), 337 (2023)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"5121_CR39","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s11128-024-04500-z","volume":"23","author":"Q Shujing","year":"2024","unstructured":"Shujing, Q., Xiangjun, X., Jiahao, Z., Chaoyang, L., Fagen, L., Qian, Z.: Comment and improvement on the \u201csemi-quantum ring signature protocol based on multi-particle ghz state\u2019\u2019. Quantum Inf. Process. 23(8), 287 (2024)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05121-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05121-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05121-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:26:49Z","timestamp":1773656809000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05121-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,16]]},"references-count":39,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["5121"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05121-4","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,16]]},"assertion":[{"value":"14 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"Not applicable. The authors all agreed to participate.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"The authors all agreed to the publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}}],"article-number":"102"}}