{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T02:28:21Z","timestamp":1768876101793,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T00:00:00Z","timestamp":1768780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T00:00:00Z","timestamp":1768780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-025-00593-x","type":"journal-article","created":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T13:39:04Z","timestamp":1768829944000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On a lattice-based post-quantum ring signature scheme"],"prefix":"10.1007","volume":"22","author":[{"given":"Artyom","family":"Kuninets","sequence":"first","affiliation":[]},{"given":"Ekaterina","family":"Malygina","sequence":"additional","affiliation":[]},{"given":"Alexey","family":"Nesterenko","sequence":"additional","affiliation":[]},{"given":"Alexey","family":"Kurochkin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,19]]},"reference":[{"key":"593_CR1","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret 2248, 552\u2013565 (2001)","DOI":"10.1007\/3-540-45682-1_32"},{"key":"593_CR2","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-27800-9_28","volume-title":"Information security and privacy","author":"JK Liu","year":"2004","unstructured":"Liu, J.K., Wei, V.K., Wong, D.S.: Linkable spontaneous anonymous group signature for ad hoc groups. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) Information security and privacy, pp. 325\u2013335. Springer, Berlin, Heidelberg (2004)"},{"key":"593_CR3","doi-asserted-by":"crossref","unstructured":"Torres, W., Steinfeld, R., Sakzad, A., Liu, J., Kuchta, V., Bhattacharjee, N., Au, M.H., Cheng, J.: Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0). In: Information Security and Privacy, pp. 558\u2013576 (2018)","DOI":"10.1007\/978-3-319-93638-3_32"},{"key":"593_CR4","doi-asserted-by":"crossref","unstructured":"Liu, J., Wong, D.: Linkable ring signatures: Security models and new schemes. In: Advances in Cryptology\u2014ASIACRYPT 2005, vol. 3481, pp. 614\u2013623 (2005)","DOI":"10.1007\/11424826_65"},{"key":"593_CR5","first-page":"577","volume":"2012","author":"MK Franklin","year":"2012","unstructured":"Franklin, M.K., Zhang, H.: A framework for unique ring signatures. IACR Cryptol. ePrint Arch. 2012, 577 (2012)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"593_CR6","unstructured":"Wang, X., Chen, Y., Ma, X.: Adding linkability to ring signatures with one-time signatures. Cryptology ePrint Archive, Paper 2019\/371 (2019). https:\/\/eprint.iacr.org\/2019\/371"},{"key":"593_CR7","doi-asserted-by":"crossref","unstructured":"Baum, C., Lin, H., Oechsner, S.: Towards practical lattice-based one-time linkable ring signatures. In: Blanc, G., Qing, S., Lu, R., Zhang, Z., Meddahi, A., Naccache, D., Xu, S., Samarati, P. (eds.) Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 303\u2013322. Springer, ??? (2018)","DOI":"10.1007\/978-3-030-01950-1_18"},{"key":"593_CR8","doi-asserted-by":"crossref","unstructured":"Lu, X., Au, M.H., Zhang, Z.: Raptor: a practical lattice-based (linkable) ring signature. In: Applied Cryptography and Network Security: 17th International Conference, ACNS 2019, Bogota, Colombia, June 5\u20137, 2019, Proceedings 17, pp. 110\u2013130 (2019). Springer","DOI":"10.1007\/978-3-030-21568-2_6"},{"key":"593_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-030-01446-9_12","volume-title":"Provable security","author":"P Branco","year":"2018","unstructured":"Branco, P., Mateus, P.: A code-based linkable ring signature scheme. In: Baek, J., Susilo, W., Kim, J. (eds.) Provable security, pp. 203\u2013219. Springer, Cham (2018)"},{"key":"593_CR10","first-page":"1","volume":"8","author":"Y Ren","year":"2020","unstructured":"Ren, Y., Zhao, Q., Guan, H., Lin, Z.: On design of single-layer and multilayer code-based linkable ring signatures. IEEE Access 8, 1\u20131 (2020)","journal-title":"IEEE Access"},{"key":"593_CR11","unstructured":"Prest, T.: Gaussian sampling in lattice-based cryptography. PhD thesis (2015). https:\/\/theses.hal.science\/tel-01245066"},{"key":"593_CR12","unstructured":"Fouque, P.-A., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Prest, T., Ricosset, T., Seiler, G., Whyte, W., Zhang, Z.: Falcon: fast-Fourier lattice-based compact signatures over ntru. (2019)"},{"key":"593_CR13","doi-asserted-by":"crossref","unstructured":"Espitau, T., Fouque, P.-A., G\u00e9rard, F., Rossi, M., Takahashi, A., Tibouchi, M., Wallet, A., Yu, Y.: Mitaka: a simpler, parallelizable, maskable variant of falcon. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 222\u2013253 (2022). Springer","DOI":"10.1007\/978-3-031-07082-2_9"},{"key":"593_CR14","doi-asserted-by":"crossref","unstructured":"Langlois, A., Stehl\u00e9, D.: Worst-case to average-case reductions for module lattices. Designs Codes Cryptogr.75 (2014)","DOI":"10.1007\/s10623-014-9938-4"},{"key":"593_CR15","doi-asserted-by":"crossref","unstructured":"Alberto Torres, W., Steinfeld, R., Sakzad, A., Liu, J., Kuchta, V., Bhattacharjee, N., Au, M., Cheng, J.: Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0). In: Susilo, W., Yang, G. (eds.) Information Security and Privacy. Lecture Notes in Computer Science, pp. 558\u2013576. Springer, ??? (2018). Australasian Conference on Information Security and Privacy 2018, ACISP 2018 ; Conference date: 11-07-2018 Through 13-07-2018","DOI":"10.1007\/978-3-319-93638-3_32"},{"key":"593_CR16","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions 14, 197\u2013206 (2008)","DOI":"10.1145\/1374376.1374407"},{"key":"593_CR17","unstructured":"Krawczyk, H., Rabin, T.: Chameleon signatures. In: Network and distributed system security symposium (2000). https:\/\/api.semanticscholar.org\/CorpusID:30185442"},{"issue":"5","key":"593_CR18","first-page":"1","volume":"36","author":"P-A Fouque","year":"2018","unstructured":"Fouque, P.-A., Hoffstein, J., Kirchner, P., Lyubashevsky, V., Pornin, T., Prest, T., Ricosset, T., Seiler, G., Whyte, W., Zhang, Z., et al.: Falcon: fast-Fourier lattice-based compact signatures over ntru. Submiss. NIST\u2019s Post-Quantum Cryptogr. Stand. Process 36(5), 1\u201375 (2018)","journal-title":"Submiss. NIST\u2019s Post-Quantum Cryptogr. Stand. Process"},{"key":"593_CR19","doi-asserted-by":"crossref","unstructured":"Chuengsatiansup, C., Prest, T., Stehl\u00e9, D., Wallet, A., Xagawa, K.: Modfalcon: Compact signatures based on module-ntru lattices, pp. 853\u2013866 (2020)","DOI":"10.1145\/3320269.3384758"},{"key":"593_CR20","unstructured":"Prest, T., Fouque, P.A., Hoffstein, J., Kirchner, V. P.\u00a0v\u00a0Lyubashevsky, Pornin, T., Ricosset, T., Seiler, G., Whyte, W., Zhang, Z.: Falcon. Tech. Rep., National Institute of Standards and Technology (2020)"},{"key":"593_CR21","doi-asserted-by":"crossref","unstructured":"Micciancio, D., Walter, M.: Practical, predictable lattice basis reduction. In: Advances in cryptology\u2013EUROCRYPT 2016: 35th Annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I 35, pp. 820\u2013849 (2016). Springer","DOI":"10.1007\/978-3-662-49890-3_31"},{"key":"593_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02579403","volume":"6","author":"L Babai","year":"1986","unstructured":"Babai, L.: On lov\u00e1sz\u2019lattice reduction and the nearest lattice point problem. Combinatorica 6, 1\u201313 (1986)","journal-title":"Combinatorica"},{"key":"593_CR23","unstructured":"Alkim, E., Ducas, L., P\u00f6ppelmann, T., Schwabe, P.: Post-quantum key $$\\{$$Exchange\u2014A$$\\}$$ new hope. In: 25th USENIX security symposium (USENIX Security 16), pp. 327\u2013343 (2016)"},{"key":"593_CR24","doi-asserted-by":"crossref","unstructured":"Albrecht, M.R., Curtis, B.R., Deo, A., Davidson, A., Player, R., Postlethwaite, E.W., Virdia, F., Wunderer, T.: Estimate all the LWE, NTRU schemes! Cryptology ePrint Archive, Report 2018\/331. https:\/\/eprint.iacr.org\/2018\/331 (2018)","DOI":"10.1007\/978-3-319-98113-0_19"},{"key":"593_CR25","doi-asserted-by":"crossref","unstructured":"Chen, Y., Nguyen, P.Q.: BKZ 2.0: Better lattice security estimates. In: ASIACRYPT 2011, pp. 1\u201320. Springer (2011)","DOI":"10.1007\/978-3-642-25385-0_1"},{"key":"593_CR26","first-page":"708","volume":"2015","author":"J Hoffstein","year":"2015","unstructured":"Hoffstein, J., Pipher, J., Schanck, J.M., Silverman, J.H., Whyte, W., Zhang, Z.: Choosing parameters for ntruencrypt. IACR Cryptol. ePrint Archive 2015, 708 (2015)","journal-title":"IACR Cryptol. ePrint Archive"},{"key":"593_CR27","doi-asserted-by":"crossref","unstructured":"Yuen, T.H., Esgin, M.F., Liu, J.K., Au, M.H., Ding, Z.: Dualring: generic construction of ring signatures with efficient instantiations. In: Annual international cryptology conference, pp. 251\u2013281 (2021). Springer","DOI":"10.1007\/978-3-030-84242-0_10"},{"key":"593_CR28","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V., Nguyen, N.K., Seiler, G.: Smile: set membership from ideal lattices with applications to ring signatures and confidential transactions. In: Annual international cryptology conference, pp. 611\u2013640 (2021). Springer","DOI":"10.1007\/978-3-030-84245-1_21"},{"key":"593_CR29","unstructured":"Yu, G.: Blockchain stealth address schemes. Cryptology ePrint Archive (2020)"},{"key":"593_CR30","doi-asserted-by":"crossref","unstructured":"Sun, S.-F., Au, M.H., Liu, J.K., Yuen, T.H.: Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero. In: Computer Security\u2013ESORICS 2017: 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II 22, pp. 456\u2013474 (2017). Springer","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"593_CR31","doi-asserted-by":"crossref","unstructured":"Poelstra, A., Back, A., Friedenbach, M., Maxwell, G., Wuille, P.: Confidential assets. In: International conference on financial cryptography and data security, pp. 43\u201363 (2018). Springer","DOI":"10.1007\/978-3-662-58820-8_4"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-025-00593-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-025-00593-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-025-00593-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T13:39:09Z","timestamp":1768829949000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-025-00593-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,19]]},"references-count":31,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["593"],"URL":"https:\/\/doi.org\/10.1007\/s11416-025-00593-x","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,19]]},"assertion":[{"value":"24 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"15"}}