{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:49:42Z","timestamp":1749703782296,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Major Program of Guangdong Basic and Applied Research","award":["2019B030302008"],"award-info":[{"award-number":["2019B030302008"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272174"],"award-info":[{"award-number":["62272174"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Program of Guang-zhou","award":["201902010081"],"award-info":[{"award-number":["201902010081"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s12083-023-01474-0","type":"journal-article","created":{"date-parts":[[2023,3,29]],"date-time":"2023-03-29T10:02:47Z","timestamp":1680084167000},"page":"1270-1285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An identity-based traceable ring signatures based on lattice"],"prefix":"10.1007","volume":"16","author":[{"given":"Junbin","family":"Liang","sequence":"first","affiliation":[]},{"given":"Qiong","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jianye","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Liantao","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Man Ho Allen","family":"Au","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,29]]},"reference":[{"key":"1474_CR1","doi-asserted-by":"publisher","unstructured":"Shor PW (1994) Algorithms for quantum computation: Discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994, IEEE Comput Soc pp 124\u2013134. https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"1474_CR2","doi-asserted-by":"publisher","unstructured":"Ajtai M (1996) Generating hard instances of lattice problems (extended abstract). In: Miller GL (ed) Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996, ACM, pp 99\u2013108, https:\/\/doi.org\/10.1145\/237814.237838","DOI":"10.1145\/237814.237838"},{"key":"1474_CR3","doi-asserted-by":"publisher","unstructured":"Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In: Boyd C (ed) Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, Springer, Lecture Notes in Computer Science, vol 2248, pp 552\u2013565. https:\/\/doi.org\/10.1007\/3-540-45682-1_32","DOI":"10.1007\/3-540-45682-1_32"},{"key":"1474_CR4","doi-asserted-by":"publisher","unstructured":"Chan TK, Fung K, Liu JK, Wei VK (2004) Blind spontaneous anonymous group signatures for ad hoc groups. In: Castelluccia C, Hartenstein H, Paar C, Westhoff D (eds) Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers, Springer, Lecture Notes in Computer Science, vol 3313, pp 82\u201394. https:\/\/doi.org\/10.1007\/978-3-540-30496-8_8","DOI":"10.1007\/978-3-540-30496-8_8"},{"key":"1474_CR5","doi-asserted-by":"publisher","unstructured":"Chen Y, Susilo W, Mu Y (2006) Identity-based anonymous designated ring signatures. In: Onoe S, Guizani M, Chen H, Sawahashi M (eds) Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, ACM, pp 189\u2013194. https:\/\/doi.org\/10.1145\/1143549.1143588","DOI":"10.1145\/1143549.1143588"},{"key":"1474_CR6","doi-asserted-by":"publisher","unstructured":"Chow SSM, Yiu S, Hui LCK (2005) Efficient identity based ring signature. In: Ioannidis J, Keromytis AD, Yung M (eds) Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, Lecture Notes in Computer Science, vol 3531, pp 499\u2013512. https:\/\/doi.org\/10.1007\/11496137_34","DOI":"10.1007\/11496137_34"},{"key":"1474_CR7","doi-asserted-by":"publisher","unstructured":"Dodis Y, Kiayias A, Nicolosi A, Shoup V (2004) Anonymous identification in ad hoc groups. In: Cachin C, Camenisch J (eds) Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, Springer, Lecture Notes in Computer Science, vol 3027, pp 609\u2013626. https:\/\/doi.org\/10.1007\/978-3-540-24676-3_36","DOI":"10.1007\/978-3-540-24676-3_36"},{"key":"1474_CR8","doi-asserted-by":"publisher","unstructured":"Herranz J, S\u00e1ez G (2004) New identity-based ring signature schemes. In: L\u00f3pez J, Qing S, Okamoto E (eds) Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, Springer, Lecture Notes in Computer Science, vol 3269, pp 27\u201339. https:\/\/doi.org\/10.1007\/978-3-540-30191-2_3","DOI":"10.1007\/978-3-540-30191-2_3"},{"key":"1474_CR9","doi-asserted-by":"publisher","unstructured":"Zhang F, Kim K (2002) Id-based blind signature and ring signature from pairings. In: Zheng Y (ed) Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, Springer, Lecture Notes in Computer Science, vol 2501, pp 533\u2013547. https:\/\/doi.org\/10.1007\/3-540-36178-2_33","DOI":"10.1007\/3-540-36178-2_33"},{"key":"1474_CR10","unstructured":"Brakerski Z, Kalai YT (2010) A framework for efficient signatures, ring signatures and identity based encryption in the standard model. IACR Cryptol ePrint Arch p\u00a086, https:\/\/eprint.iacr.org\/2010\/086"},{"key":"1474_CR11","doi-asserted-by":"publisher","unstructured":"Wang J, Sun B (2011) Ring signature schemes from lattice basis delegation. In: Qing S, Susilo W, Wang G, Liu D (eds) Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings, Springer, Lecture Notes in Computer Science, vol 7043, pp 15\u201328. https:\/\/doi.org\/10.1007\/978-3-642-25243-3_2","DOI":"10.1007\/978-3-642-25243-3_2"},{"key":"1474_CR12","first-page":"8","volume":"3","author":"G Wen","year":"2016","unstructured":"Wen G, Hu Y, Wang B, Jia X (2016) Improved lattice-based ring signature schemes from basis delegation. J China Univ Posts Telecommun 3:8","journal-title":"J China Univ Posts Telecommun"},{"key":"1474_CR13","doi-asserted-by":"crossref","unstructured":"Liu JK, Wei VK, Wong DS (2004) Linkable spontaneous anonymous group signature for ad hoc groups. IACR Cryptol ePrint Arch p\u00a027, http:\/\/eprint.iacr.org\/2004\/027","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"1474_CR14","doi-asserted-by":"crossref","unstructured":"Sun S, Au MH, Liu JK, Yuen TH, Gu D (2017) Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero. IACR Cryptol ePrint Arch p 921, http:\/\/eprint.iacr.org\/2017\/921","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"1474_CR15","unstructured":"Tsang PP, Wei VK (2004) Short linkable ring signatures for e-voting, e-cash and attestation. IACR Cryptol ePrint Arch p 281.\u00a0http:\/\/eprint.iacr.org\/2004\/281"},{"key":"1474_CR16","doi-asserted-by":"publisher","unstructured":"Fujisaki E, Suzuki K (2007) Traceable ring signature. In: Okamoto T, Wang X (eds) Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, Springer, Lecture Notes in Computer Science, vol 4450, pp. 181\u2013200. https:\/\/doi.org\/10.1007\/978-3-540-71677-8_13","DOI":"10.1007\/978-3-540-71677-8_13"},{"key":"1474_CR17","doi-asserted-by":"publisher","unstructured":"Au MH, Liu JK, Susilo W, Yuen TH (2007) Certificate based (linkable) ring signature. In: Dawson E, Wong DS (eds) Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, Springer, Lecture Notes in Computer Science, vol 4464, pp 79\u201392. https:\/\/doi.org\/10.1007\/978-3-540-72163-5_8","DOI":"10.1007\/978-3-540-72163-5_8"},{"key":"1474_CR18","doi-asserted-by":"publisher","unstructured":"Bender A, Katz J, Morselli R (2006) Ring signatures: Stronger definitions, and constructions without random oracles. In: Halevi S, Rabin T (eds) Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, Springer, Lecture Notes in Computer Science, vol 3876, pp 60\u201379. https:\/\/doi.org\/10.1007\/11681878_4","DOI":"10.1007\/11681878_4"},{"key":"1474_CR19","doi-asserted-by":"publisher","first-page":"153969","DOI":"10.1109\/ACCESS.2019.2948972","volume":"7","author":"L Deng","year":"2019","unstructured":"Deng L, Jiang Y, Ning B (2019) Identity-based linkable ring signature scheme. IEEE Access 7:153969\u2013153976. https:\/\/doi.org\/10.1109\/ACCESS.2019.2948972","journal-title":"IEEE Access"},{"issue":"6","key":"1474_CR20","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1142\/S0129054106004480","volume":"17","author":"JK Liu","year":"2006","unstructured":"Liu JK, Wong DS (2006) Enhanced security models and a generic construction approach for linkable ring signature. Int J Found Comput Sci 17(6):1403\u20131422. https:\/\/doi.org\/10.1142\/S0129054106004480","journal-title":"Int J Found Comput Sci"},{"key":"1474_CR21","doi-asserted-by":"publisher","unstructured":"Tsang PP, Wei VK (2005) Short linkable ring signatures for e-voting, e-cash and attestation. In: Deng RH, Bao F, Pang H, Zhou J (eds) Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, Springer, Lecture Notes in Computer Science, vol 3439, pp 48\u201360. https:\/\/doi.org\/10.1007\/978-3-540-31979-5_5","DOI":"10.1007\/978-3-540-31979-5_5"},{"issue":"4","key":"1474_CR22","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1093\/comjnl\/bxs115","volume":"56","author":"TH Yuen","year":"2013","unstructured":"Yuen TH, Liu JK, Au MH, Susilo W, Zhou J (2013) Efficient linkable and\/or threshold ring signature without random oracles. Comput J 56(4):407\u2013421. https:\/\/doi.org\/10.1093\/comjnl\/bxs115","journal-title":"Comput J"},{"key":"1474_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.tcs.2012.10.031","volume":"469","author":"MH Au","year":"2013","unstructured":"Au MH, Liu JK, Susilo W, Yuen TH (2013) Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction. Theor Comput Sci 469:1\u201314. https:\/\/doi.org\/10.1016\/j.tcs.2012.10.031","journal-title":"Theor Comput Sci"},{"key":"1474_CR24","doi-asserted-by":"publisher","unstructured":"Bultel X, Lafourcade P (2016) k-times full traceable ring signature. In: 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016, IEEE Computer Society, pp 39\u201348 https:\/\/doi.org\/10.1109\/ARES.2016.37","DOI":"10.1109\/ARES.2016.37"},{"key":"1474_CR25","doi-asserted-by":"publisher","unstructured":"Fujisaki E (2012) Sub-linear size traceable ring signatures without random oracles. IEICE Trans Fundam Electron Commun Comput Sci 95-A(1):151\u2013166. https:\/\/doi.org\/10.1587\/transfun.E95.A.151","DOI":"10.1587\/transfun.E95.A.151"},{"key":"1474_CR26","unstructured":"Gu K, Wang L, Wu N, Liao N (2018) Traceable certificateless ring signature scheme for no full anonymous applications. Int J Netw Secur 20(4):762\u2013773, http:\/\/ijns.jalaxy.com.tw\/contents\/ijns-v20-n4\/ijns-2018-v20-n4-p762-773.pdf"},{"issue":"2","key":"1474_CR27","doi-asserted-by":"publisher","first-page":"207","DOI":"10.3934\/amc.2020016","volume":"14","author":"K Gu","year":"2020","unstructured":"Gu K, Dong X, Wang L (2020) Efficient traceable ring signature scheme without pairings. Adv Math Commun 14(2):207\u2013232. https:\/\/doi.org\/10.3934\/amc.2020016","journal-title":"Adv Math Commun"},{"key":"1474_CR28","doi-asserted-by":"publisher","unstructured":"Peng X, Gu K, Liu Z, Zhang W (2021) Traceable identity-based ring signature for protecting mobile iot devices. In: Tan Y, Shi Y, Zomaya AY, Yan H, Cai J (eds) Data Mining and Big Data - 6th International Conference, DMBD 2021, Guangzhou, China, October 20-22, 2021, Proceedings, Part II, Springer, Communications in Computer and Information Science, vol 1454, pp 158\u2013166. https:\/\/doi.org\/10.1007\/978-981-16-7502-7_18","DOI":"10.1007\/978-981-16-7502-7_18"},{"key":"1474_CR29","doi-asserted-by":"publisher","unstructured":"Tang F, Pang J, Cheng K, Gong Q (2021) Multiauthority traceable ring signature scheme for smart grid based on blockchain. Wirel Commun Mob Comput 2021:5566430:1\u20135566430:9. https:\/\/doi.org\/10.1155\/2021\/5566430","DOI":"10.1155\/2021\/5566430"},{"key":"1474_CR30","doi-asserted-by":"crossref","unstructured":"M\u00a0M\u00a0Tian YW L\u00a0S\u00a0Huang (2012) Efficient lattice-based ring signature scheme. Chinese J\u00a0 Comput pp. 712\u2013718","DOI":"10.3724\/SP.J.1016.2012.00712"},{"key":"1474_CR31","doi-asserted-by":"publisher","unstructured":"Lyubashevsky V (2012) Lattice signatures without trapdoors. In: Pointcheval D, Johansson T (eds) Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings, Springer, Lecture Notes in Computer Science, vol 7237 pp. 738\u2013755. https:\/\/doi.org\/10.1007\/978-3-642-29011-4_43","DOI":"10.1007\/978-3-642-29011-4_43"},{"key":"1474_CR32","doi-asserted-by":"publisher","unstructured":"Libert B, Ling S, Nguyen K, Wang H (2016) Zero-knowledge arguments for lattice-based accumulators: Logarithmic-size ring signatures and group signatures without trapdoors. In: Fischlin M, Coron J (eds) Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II, Springer, Lecture Notes in Computer Science, vol 9666 pp. 1\u201331. https:\/\/doi.org\/10.1007\/978-3-662-49896-5_1","DOI":"10.1007\/978-3-662-49896-5_1"},{"issue":"4","key":"1474_CR33","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1504\/IJHPCN.2018.10014445","volume":"11","author":"S Wang","year":"2018","unstructured":"Wang S, Zhao R, Zhang Y (2018) Lattice-based ring signature scheme under the random oracle model. Int J High Perform Comput Netw 11(4):332\u2013341. https:\/\/doi.org\/10.1504\/IJHPCN.2018.10014445","journal-title":"Int J High Perform Comput Netw"},{"key":"1474_CR34","doi-asserted-by":"publisher","unstructured":"Lu X, Au MH, Zhang Z (2019) Raptor: A practical lattice-based (linkable) ring signature. In: Deng RH, Gauthier-Uma\u00f1a V, Ochoa M, Yung M (eds) Applied Cryptography and Network Security - 17th International Conference, ACNS 2019, Bogota, Colombia, June 5-7, 2019, Proceedings, Springer, Lecture Notes in Computer Science, vol 11464, pp 110\u2013130.\u00a0https:\/\/doi.org\/10.1007\/978-3-030-21568-2_6","DOI":"10.1007\/978-3-030-21568-2_6"},{"key":"1474_CR35","doi-asserted-by":"publisher","unstructured":"Melchor CA, Bettaieb S, Boyen X, Fousse L, Gaborit P (2013) Adapting lyubashevsky\u2019s signature schemes to the ring signature setting. In: Youssef AM, Nitaj A, Hassanien AE (eds) Progress in Cryptology - AFRICACRYPT 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings, Springer, Lecture Notes in Computer Science, vol 7918 pp. 1\u201325. https:\/\/doi.org\/10.1007\/978-3-642-38553-7_1","DOI":"10.1007\/978-3-642-38553-7_1"},{"key":"1474_CR36","unstructured":"Yang R, Au MH, Lai J, Xu Q, Yu Z (2017) Lattice-based techniques for accountable anonymity: Composition of abstract stern\u2019s protocols and weak PRF with efficient protocols from LWR. IACR Cryptol ePrint Arch p. 781. http:\/\/eprint.iacr.org\/2017\/781"},{"key":"1474_CR37","unstructured":"Esgin MF, Steinfeld R, Sakzad A, Liu JK, Liu D (2018) Short lattice-based one-out-of-many proofs and applications to ring signatures. IACR Cryptol ePrint Arch p 773, https:\/\/eprint.iacr.org\/2018\/773"},{"key":"1474_CR38","doi-asserted-by":"crossref","unstructured":"Torres WAA, Steinfeld R, Sakzad A, Liu JK, Kuchta V, Bhattacharjee N, Au MH, Cheng J (2018) Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0). In: Susilo W, Yang G (eds) Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, Springer, Lecture Notes in Computer Science, vol 10946, pp. 558\u2013576.\u00a0https:\/\/doi.org\/10.1007\/978-3-319-93638-3_32","DOI":"10.1007\/978-3-319-93638-3_32"},{"key":"1474_CR39","doi-asserted-by":"publisher","unstructured":"Baum C, Lin H, Oechsner S (2018) Towards practical lattice-based one-time linkable ring signatures. In: Naccache D, Xu S, Qing S, Samarati P, Blanc G, Lu R, Zhang Z, Meddahi A (eds) Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings, Springer, Lecture Notes in Computer Science, vol 11149 pp. 303\u2013322. https:\/\/doi.org\/10.1007\/978-3-030-01950-1_18","DOI":"10.1007\/978-3-030-01950-1_18"},{"issue":"3","key":"1474_CR40","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1007\/s12652-021-03092-1","volume":"13","author":"Y Ren","year":"2022","unstructured":"Ren Y, Guan H, Zhao Q (2022) An efficient lattice-based linkable ring signature scheme with scalability to multiple layer. J Ambient Intell Humaniz Comput 13(3):1547\u20131556. https:\/\/doi.org\/10.1007\/s12652-021-03092-1","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1474_CR41","doi-asserted-by":"publisher","first-page":"84739","DOI":"10.1109\/ACCESS.2021.3087808","volume":"9","author":"HQ Le","year":"2021","unstructured":"Le HQ, Vo B, Duong DH, Susilo W, Le NT, Fukushima K, Kiyomoto S (2021) Identity-based linkable ring signatures from lattices. IEEE Access 9:84739\u201384755. https:\/\/doi.org\/10.1109\/ACCESS.2021.3087808","journal-title":"IEEE Access"},{"key":"1474_CR42","unstructured":"Hu M, Liu Z (2022) Lattice-based linkable ring signature in the standard model. IACR Cryptol ePrint Arch p. 101. https:\/\/eprint.iacr.org\/2022\/101"},{"key":"1474_CR43","doi-asserted-by":"publisher","unstructured":"Feng H, Liu J, Wu Q, Li Y (2020) Traceable ring signatures with post-quantum security. In: Jarecki S (ed) Topics in Cryptology - CT-RSA 2020 - The Cryptographers\u2019 Track at the RSA Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings, Springer, Lecture Notes in Computer Science vol 12006 pp. 442\u2013468.\u00a0https:\/\/doi.org\/10.1007\/978-3-030-40186-3_19","DOI":"10.1007\/978-3-030-40186-3_19"},{"key":"1474_CR44","doi-asserted-by":"publisher","unstructured":"Yang R, Au MH, Zhang Z, Xu Q, Yu Z, Whyte W (2019) Efficient lattice-based zero-knowledge arguments with standard soundness: Construction and applications. In: Boldyreva A, Micciancio D (eds) Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part I, Springer, Lecture Notes in Computer Science vol 11692 pp. 147\u2013175. https:\/\/doi.org\/10.1007\/978-3-030-26948-7_6","DOI":"10.1007\/978-3-030-26948-7_6"},{"key":"1474_CR45","doi-asserted-by":"publisher","unstructured":"Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Dwork C (ed) Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008, ACM, pp 197\u2013206. https:\/\/doi.org\/10.1145\/1374376.1374407","DOI":"10.1145\/1374376.1374407"},{"key":"1474_CR46","doi-asserted-by":"publisher","unstructured":"Micciancio D, Peikert C (2013) Hardness of SIS and LWE with small parameters. In: Canetti R, Garay JA (eds) Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I, Springer, Lecture Notes in Computer Science, vol 8042 pp. 21\u201339. https:\/\/doi.org\/10.1007\/978-3-642-40041-4_2","DOI":"10.1007\/978-3-642-40041-4_2"},{"key":"1474_CR47","doi-asserted-by":"publisher","unstructured":"Micciancio D, Regev O (2004) Worst-case to average-case reductions based on gaussian measures. In: 45th Symposium on Foundations of Computer Science (FOCS 2004), 17-19 October 2004, Rome, Italy, Proceedings, IEEE Computer Society pp. 372\u2013381. https:\/\/doi.org\/10.1109\/FOCS.2004.72","DOI":"10.1109\/FOCS.2004.72"},{"issue":"4","key":"1474_CR48","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1561\/0400000074","volume":"10","author":"C Peikert","year":"2016","unstructured":"Peikert C (2016) A decade of lattice cryptography. Found Trends Theor Comput Sci 10(4):283\u2013424. https:\/\/doi.org\/10.1561\/0400000074","journal-title":"Found Trends Theor Comput Sci"},{"key":"1474_CR49","doi-asserted-by":"publisher","unstructured":"Regev O (2005) On lattices, learning with errors, random linear codes, and cryptography. In: Gabow HN, Fagin R (eds) Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24\u00a02005\u00a0ACM, pp. 84\u201393. https:\/\/doi.org\/10.1145\/1060590.1060603","DOI":"10.1145\/1060590.1060603"},{"key":"1474_CR50","doi-asserted-by":"publisher","unstructured":"Banerjee A, Peikert C, Rosen A (2012) Pseudorandom functions and lattices. In: Pointcheval D, Johansson T (eds) Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings, Springer, Lecture Notes in Computer Science, vol 7237, pp. 719\u2013737. https:\/\/doi.org\/10.1007\/978-3-642-29011-4_42,","DOI":"10.1007\/978-3-642-29011-4_42"},{"key":"1474_CR51","doi-asserted-by":"publisher","unstructured":"Micciancio D, Peikert C (2012) Trapdoors for lattices: Simpler, tighter, faster, smaller. In: Pointcheval D, Johansson T (eds) Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings, Springer, Lecture Notes in Computer Science, vol 7237, pp. 700\u2013718. https:\/\/doi.org\/10.1007\/978-3-642-29011-4_41","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"1474_CR52","doi-asserted-by":"publisher","unstructured":"Holmgren J, Lombardi A (2018) Cryptographic hashing from strong one-way functions (or: One-way product functions and their applications). In: Thorup M (ed) 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018, IEEE Computer Society, pp. 850\u2013858. https:\/\/doi.org\/10.1109\/FOCS.2018.00085","DOI":"10.1109\/FOCS.2018.00085"},{"key":"1474_CR53","doi-asserted-by":"crossref","unstructured":"Libert B, Ling S, Nguyen K, Wang H (2017) Zero-knowledge arguments for lattice-based prfs and applications to e-cash. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer, pp. 304\u2013335","DOI":"10.1007\/978-3-319-70700-6_11"},{"key":"1474_CR54","doi-asserted-by":"crossref","unstructured":"Ling S, Nguyen K, Stehl\u00e9 D, Wang H (2013) Improved zero-knowledge proofs of knowledge for the isis problem, and applications. In: International workshop on public key cryptography, Springer, pp. 107\u2013124","DOI":"10.1007\/978-3-642-36362-7_8"},{"key":"1474_CR55","doi-asserted-by":"publisher","unstructured":"Zhao G, Tian M (2018) A simpler construction of identity-based ring signatures from lattices. In: Baek J, Susilo W, Kim J (eds) Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings, Springer, Lecture Notes in Computer Science, vol 11192, pp. 277\u2013291. https:\/\/doi.org\/10.1007\/978-3-030-01446-9_16","DOI":"10.1007\/978-3-030-01446-9_16"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01474-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01474-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01474-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T04:22:27Z","timestamp":1683260547000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-023-01474-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["1474"],"URL":"https:\/\/doi.org\/10.1007\/s12083-023-01474-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2023,3]]},"assertion":[{"value":"18 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Consent for publication I have taken consent from my co-authors \nbefore publishing the manuscript with Peer Networking and Applications journal of Springer. I confirm that the manuscript is the authors\u2019 original work and the manuscript is not under consideration for publication elsewhere.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}