{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:30:30Z","timestamp":1772908230010,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2007,11,1]],"date-time":"2007-11-01T00:00:00Z","timestamp":1193875200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1007\/s11390-007-9096-5","type":"journal-article","created":{"date-parts":[[2007,11,17]],"date-time":"2007-11-17T03:02:53Z","timestamp":1195268573000},"page":"785-794","source":"Crossref","is-referenced-by-count":60,"title":["Revocable Ring Signature"],"prefix":"10.1007","volume":"22","author":[{"given":"Dennis Y. W.","family":"Liu","sequence":"first","affiliation":[]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,11,17]]},"reference":[{"key":"9096_CR1","doi-asserted-by":"crossref","unstructured":"Rivest R, Shamir A, Tauman Y. How to leak a secret. In Proc. ASIACRYPT 2001, Australia, Lecture Notes in Computer Science, 2248, Springer-Verlag, 2001, pp.552\u2013565.","DOI":"10.1007\/3-540-45682-1_32"},{"key":"9096_CR2","doi-asserted-by":"crossref","unstructured":"Bresson E, Stern J, Szydlo M. Threshold ring signatures and applications to ad-hoc groups. In Proc. CRYPTO 2002, USA, Lecture Notes in Computer Science, 2442, Springer-Verlag, 2002, pp.465\u2013480.","DOI":"10.1007\/3-540-45708-9_30"},{"key":"9096_CR3","doi-asserted-by":"crossref","unstructured":"Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures from a variety of keys. In Proc. ASIACRYPT 2002, New Zealand, Lecture Notes in Computer Science, 2501, Springer-Verlag, 2002, pp.415\u2013432.","DOI":"10.1007\/3-540-36178-2_26"},{"key":"9096_CR4","doi-asserted-by":"crossref","unstructured":"Wong D S, Fung K, Liu J, Wei V. On the RS-code construction of ring signature schemes and a threshold setting of RST. In Proc. 5th Int. Conference on Information and Communication Security (ICICS 2003), China, Lecture Notes in Computer Science, 2836, Springer-Verlag, 2003, pp.34\u201346.","DOI":"10.1007\/978-3-540-39927-8_4"},{"key":"9096_CR5","doi-asserted-by":"crossref","unstructured":"Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In Proc. EUROCRYPT 2003, Poland, Lecture Notes in Computer Science, 2656, Springer-Verlag, 2003, pp.416\u2013432.","DOI":"10.1007\/3-540-39200-9_26"},{"key":"9096_CR6","doi-asserted-by":"crossref","unstructured":"Dodis Y, Kiayias A, Nicolosi A, Shoup V. Anonymous identification in ad doc groups. In Proc. EUROCRYPT 2004, Switzerland, LNCS 3027, Springer-Verlag, 2004, pp.609\u2013626, Full version: http:\/\/www.cs.nyu.edu\/ nicolo-si\/papers\/","DOI":"10.1007\/978-3-540-24676-3_36"},{"key":"9096_CR7","doi-asserted-by":"crossref","unstructured":"Liu J K, Wong D S. On the security models of (threshold) ring signature schemes. In Proc. 7th Annual International Conference on Information Security and Cryptology (ICISC 2004), Korea, Lecture Notes in Computer Science, 3506, Springer-Verlag 2005, pp.204\u2013217.","DOI":"10.1007\/11496618_16"},{"key":"9096_CR8","doi-asserted-by":"crossref","unstructured":"Bender A, Katz J, Morselli R. Ring signatures: Stronger definitions, and constructions without random oracles. In Proc. Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, USA, Lecture Notes in Computer Science, 3876, Springer, 2006, pp.60\u201379, Full version: http:\/\/eprint.iacr.org\/2005\/304\/ .","DOI":"10.1007\/11681878_4"},{"key":"9096_CR9","doi-asserted-by":"crossref","unstructured":"Cramer R, Damg\u00e5rd I, Schoenmakers B. Proofs of partial knowledge and simplified design of witness hiding protocols. In Proc. CRYPTO 94, USA, Lecture Notes in Computer Science, 839, Springer-Verlag, 1994, pp.174\u2013187.","DOI":"10.1007\/3-540-48658-5_19"},{"key":"9096_CR10","doi-asserted-by":"crossref","unstructured":"Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems. In Proc. CRYPTO 86, USA, LNCS 263, Springer-Verlag, 1987, pp.186\u2013199.","DOI":"10.1007\/3-540-47721-7_12"},{"key":"9096_CR11","doi-asserted-by":"crossref","unstructured":"Chaum D, Eug\u00e8ne van Heyst. Group signatures. In Proc. EUROCRYPT '91, UK, LNCS 547, Springer, 1991, pp.257\u2013265.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"9096_CR12","doi-asserted-by":"crossref","unstructured":"Camenisch J, Stadler M. Efficient group signature schemes for large groups. In Proc. CRYPTO 97, USA, LNCS 1294, Springer-Verlag, 1997, pp.410\u2013424.","DOI":"10.1007\/BFb0052252"},{"key":"9096_CR13","doi-asserted-by":"crossref","unstructured":"Bellare M, Micciancio D, Warinschi B. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Proc. EUROCRYPT 2003, Poland, LNCS 2656, Springer, 2003, pp.614\u2013629.","DOI":"10.1007\/3-540-39200-9_38"},{"key":"9096_CR14","doi-asserted-by":"crossref","unstructured":"Manulis M. Democratic group signatures \u2014 On an example of joint ventures. In Proc. ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), Taiwan, China, 2006, p.365.","DOI":"10.1145\/1128817.1128882"},{"key":"9096_CR15","doi-asserted-by":"crossref","unstructured":"Liu J K, Wei V K, Wong D S. Linkable spontaneous anonymous group signature for ad hoc groups. In Proc. ACISP 04, Australia, LNCS 3108, Springer-Verlag, 2004, pp.325\u2013335.","DOI":"10.1007\/978-3-540-27800-9_28"},{"issue":"6","key":"9096_CR16","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1142\/S0129054106004480","volume":"17","author":"J K Liu","year":"Dec. 2006","unstructured":"Liu J K, Wong D S. Enhanced security models and a generic construction approach for linkable ring signature. International Journal of Foundations of Computer Science, Dec. 2006, 17(6): 1403\u20131422.","journal-title":"International Journal of Foundations of Computer Science"},{"key":"9096_CR17","doi-asserted-by":"crossref","unstructured":"Komano Y, Ohta K, Shimbo A, Kawamura S. Toward the fair anonymous signatures: Deniable ring signatures. In Proc. CT-RSA 2006, USA, LNCS 3860, Springer-Verlag, 2006, pp.174\u2013191.","DOI":"10.1007\/11605805_12"},{"key":"9096_CR18","doi-asserted-by":"crossref","unstructured":"An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. In Proc. EUROCRYPT 02, The Netherlands, LNCS 2332, Springer-Verlag, 2002, pp.83\u2013107.","DOI":"10.1007\/3-540-46035-7_6"},{"issue":"2","key":"9096_CR19","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1998","unstructured":"Goldwasser S, Micali S, Rivest R L. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., 1998, 17(2): 281\u2013308.","journal-title":"SIAM J. Comput."},{"key":"9096_CR20","doi-asserted-by":"crossref","unstructured":"Liu J K, Wei V K, Wong D S. A separable threshold ring signature scheme. In Proc. ICISC 2003, Korea, LNCS 2971, Springer-Verlag, 2004, pp.12\u201326.","DOI":"10.1007\/978-3-540-24691-6_2"},{"key":"9096_CR21","doi-asserted-by":"crossref","unstructured":"Patrick P Tsang, Victor K Wei, Tony K Chan, Man Ho Au, Joseph K Liu, Duncan S Wong. Separable linkable threshold ring signatures. In Proc. INDOCRYPT 2004, India, LNCS 3348, Springer-Verlag, 2004, pp.384\u2013398.","DOI":"10.1007\/978-3-540-30556-9_30"},{"key":"9096_CR22","doi-asserted-by":"crossref","unstructured":"Patrick P Tsang, Victor K Wei. Short linkable ring signatures for e-voting, e-cash and attestation. In Proc. ISPEC 2005, Singapore, LNCS 3439, Springer-Verlag, 2005, pp.48\u201360.","DOI":"10.1007\/978-3-540-31979-5_5"},{"key":"9096_CR23","doi-asserted-by":"crossref","unstructured":"Wu Q, Susilo W, Mu Y, Zhang F. Ad hoc group signatures. In Proc. First International Workshop on Security (IWSEC 2006), Japan, LNCS 4266, Springer-Verlag, 2006, pp.120\u2013135.","DOI":"10.1007\/11908739_9"},{"key":"9096_CR24","doi-asserted-by":"crossref","unstructured":"Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In Proc. CRYPTO 2001, USA, LNCS 2139, 2001, pp.213\u2013229.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"9096_CR25","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1145\/168588.168596","volume-title":"Proc. 1st ACM Conference on Computer and Communications Security","author":"M Bellare","year":"1993","unstructured":"Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In Proc.1st ACM Conference on Computer and Communications Security, USA, ACM Press 1993, pp.62\u201373."},{"key":"9096_CR26","doi-asserted-by":"crossref","unstructured":"Chaum D, Pedersen T. Wallet databases with observers. In Proc. CRYPTO 92, USA, LNCS 740, Springer-Verlag, 1993, pp.89\u2013105.","DOI":"10.1007\/3-540-48071-4_7"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9096-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-007-9096-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9096-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T19:47:30Z","timestamp":1684093650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-007-9096-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2007,11]]}},"alternative-id":["9096"],"URL":"https:\/\/doi.org\/10.1007\/s11390-007-9096-5","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,11]]}}}