{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T01:21:56Z","timestamp":1752283316098},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T00:00:00Z","timestamp":1658793600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T00:00:00Z","timestamp":1658793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-022-01286-8","type":"journal-article","created":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T11:02:51Z","timestamp":1658833371000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Digital Signature Schemes Based on Group Ring"],"prefix":"10.1007","volume":"3","author":[{"given":"Sunil","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Mittal","sequence":"additional","affiliation":[]},{"given":"Sandeep","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,26]]},"reference":[{"key":"1286_CR1","doi-asserted-by":"crossref","unstructured":"Bernstein DJ, Buchmann J, Dahmen E. Post Quantum Cryptography. Springer; 2009.","DOI":"10.1007\/978-3-540-88702-7"},{"key":"1286_CR2","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1007\/978-1-4419-5906-5_225","volume-title":"Encyclopedia of Cryptography and Security","author":"G Bleumer","year":"2011","unstructured":"Bleumer G. Selective Forgery. In: van Tilborg HCA, Jajodia S, editors. Encyclopedia of Cryptography and Security. Boston: Springer; 2011. p. 1174\u20135."},{"issue":"8","key":"1286_CR3","doi-asserted-by":"publisher","first-page":"3724","DOI":"10.1109\/TII.2018.2813304","volume":"14","author":"H Cui","year":"2018","unstructured":"Cui H, Deng RH, Liu JK, Yi X, Li Y. Server-Aided attribute based signature with revocation for resource-constrained Industrial-Internet-of-Things devices. IEEE Trans Ind Informat. 2018;14(8):3724\u201332.","journal-title":"IEEE Trans Ind Informat"},{"key":"1286_CR4","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.21136\/CMJ.2020.0171-20","volume":"71","author":"C Dietzel","year":"2021","unstructured":"Dietzel C, Mittal G. Summands of finite group algebras. Czech Math J. 2021;71:1011\u20134.","journal-title":"Czech Math J"},{"issue":"8","key":"1286_CR5","doi-asserted-by":"publisher","first-page":"3669","DOI":"10.1109\/TII.2018.2791956","volume":"14","author":"C Esposito","year":"2018","unstructured":"Esposito C, Castiglione A, Palmieri F, Santis AD. Integrity for an event notification within the industrial Internet of Things by using group signatures. IEEE Trans Ind Informat. 2018;14(8):3669\u201378.","journal-title":"IEEE Trans Ind Informat"},{"key":"1286_CR6","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/s00200-016-0293-8","volume":"27","author":"N Goel","year":"2016","unstructured":"Goel N, Gupta I, Dubey M, Dass BK. Undeniable signature scheme based over group ring. AAECC. 2016;27:523\u201335.","journal-title":"AAECC"},{"key":"1286_CR7","first-page":"45","volume":"38","author":"N Goel","year":"2017","unstructured":"Goel N, Gupta I, Dass BK. Zero knowledge undeniable signature scheme over semigroup action problem. Italian J Pure Appl Math. 2017;38:45\u201353.","journal-title":"Italian J Pure Appl Math"},{"issue":"5","key":"1286_CR8","doi-asserted-by":"publisher","first-page":"1950075","DOI":"10.1142\/S179355711950075X","volume":"12","author":"I Gupta","year":"2019","unstructured":"Gupta I, Pandey A, Dubey M. A key exchange protocol using matrices over group ring. Asian Eur J Math. 2019;12(5):1950075.","journal-title":"Asian Eur J Math"},{"key":"1286_CR9","doi-asserted-by":"crossref","unstructured":"Hoffstein J, Pipher J, Silverman J. An Introduction of Mathematical Cryptography. Springer; 2008.","DOI":"10.1007\/978-0-387-77993-5_6"},{"issue":"1","key":"1286_CR10","first-page":"67","volume":"69","author":"B Hurley","year":"2011","unstructured":"Hurley B, Hurley T. Group ring cryptography. Int J Pure Appl Math. 2011;69(1):67\u201386.","journal-title":"Int J Pure Appl Math"},{"issue":"11","key":"1286_CR11","doi-asserted-by":"publisher","first-page":"1279","DOI":"10.1007\/s00521-016-2745-2","volume":"29","author":"S Inam","year":"2018","unstructured":"Inam S, Ali R. A new ElGamal-like cryptosystem based on matrices over groupring. Neural Comput Appl. 2018;29(11):1279\u201383.","journal-title":"Neural Comput Appl"},{"issue":"4","key":"1286_CR12","doi-asserted-by":"publisher","first-page":"5507","DOI":"10.1109\/JSYST.2020.3043358","volume":"15","author":"C Meshram","year":"2021","unstructured":"Meshram C, Obaidat MS, Tembhurne JV, Shende SW, Kalare KW, Meshram SG. A lightweight provably secure digital short-signature technique using extended chaotic maps for human-centered IoT systems. IEEE Syst J. 2021;15(4):5507\u201315.","journal-title":"IEEE Syst J"},{"key":"1286_CR13","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1007\/s40747-021-00555-y","volume":"8","author":"C Meshram","year":"2022","unstructured":"Meshram C, Meshram SG, Ibrahim RW, Jalab HA, Jamal SS, Barve SK. Conformal Chebyshev chaotic map-based remote user password authentication protocol using smart card. Comput Intell Syst. 2022;8:973\u201387.","journal-title":"Comput Intell Syst"},{"key":"1286_CR14","volume-title":"Handbook of Applied Cryptography","author":"A Menzes","year":"2001","unstructured":"Menzes A, Oorschot P, Vanstone S. Handbook of Applied Cryptography. Boca Raton: CRC Press; 2001."},{"key":"1286_CR15","unstructured":"Milies CP, Sehgal SK. An Introduction to group rings, Kluwer, $$2002$$."},{"key":"1286_CR16","doi-asserted-by":"publisher","first-page":"31630","DOI":"10.1109\/ACCESS.2018.2844406","volume":"6","author":"MA Mughal","year":"2018","unstructured":"Mughal MA, Luo X, Ullah A, Ullah S, Mahmood Z. A lightweight digital signature based security scheme for human centered Internet of Things. IEEE Access. 2018;6:31630\u201343.","journal-title":"IEEE Access"},{"key":"1286_CR17","doi-asserted-by":"publisher","unstructured":"Mittal G, Kumar S, Narain S, Kumar S, Group rings based public key cryptosystems. J Discret Math Sci Cryptogr. 2021. https:\/\/doi.org\/10.1080\/09720529.2020.1796868","DOI":"10.1080\/09720529.2020.1796868"},{"issue":"7","key":"1286_CR18","first-page":"1507","volume":"42","author":"G Mittal","year":"2021","unstructured":"Mittal G, Kumar S, Kumar S. Novel public-key cryptosystems based on NTRU and algebraic structure of group rings. J Info Opt Sci. 2021;42(7):1507\u201321.","journal-title":"J Info Opt Sci"},{"key":"1286_CR19","doi-asserted-by":"publisher","first-page":"0035","DOI":"10.1007\/s12046-022-01806-5","volume":"47","author":"G Mittal","year":"2022","unstructured":"Mittal G, Kumar S, Kumar S. A quantum secure ID-based cryptographic encryption based on group rings. Sadhana. 2022;47:0035.","journal-title":"Sadhana"},{"key":"1286_CR20","unstructured":"Nguyen P. A note on the security of NTRUSign, Cryptology ePrint Archive, Report 2006\/387. 2006."},{"key":"1286_CR21","doi-asserted-by":"crossref","unstructured":"Nguyen P, Regev O. Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures. In: Advances in Cryptology-EUROCRYPT\u201906, Vol. 4004, Lecture Notes in Comput. Sci., Springer. 2006.","DOI":"10.1007\/11761679_17"},{"issue":"2","key":"1286_CR22","first-page":"358","volume":"22","author":"H-T Pan","year":"2020","unstructured":"Pan H-T, Yang H-W, Wang M-S. An enhanced secure smart card-based password authentication scheme. Int J Netw Secur. 2020;22(2):358\u201363.","journal-title":"Int J Netw Secur"},{"issue":"3","key":"1286_CR23","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/s10958-008-9168-2","volume":"154","author":"SK Rososhek","year":"2008","unstructured":"Rososhek SK. Cryptosystems in automorphism groups of group rings of abelian groups. J Math Sci (NY). 2008;154(3):386\u201391.","journal-title":"J Math Sci (NY)"},{"key":"1286_CR24","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.ins.2019.09.084","volume":"512","author":"JH Seo","year":"2020","unstructured":"Seo JH. Efficient digital signatures from RSA without random oracles. Inf Sci. 2020;512:472\u201380.","journal-title":"Inf Sci"},{"issue":"2","key":"1286_CR25","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/JIOT.2016.2557487","volume":"4","author":"L Shen","year":"2017","unstructured":"Shen L, Ma J, Liu X, Wei F, Miao M. A secure and efficient ID-Based aggregate signature scheme for wireless sensor networks. IEEE Internet Things J. 2017;4(2):546\u201354.","journal-title":"IEEE Internet Things J"},{"key":"1286_CR26","doi-asserted-by":"publisher","first-page":"105898","DOI":"10.1016\/j.ipl.2019.105898","volume":"155","author":"S Singh","year":"2020","unstructured":"Singh S, Padhye S. Identity based blind signature scheme over NTRU lattices. Inf Process Lett. 2020;155:105898.","journal-title":"Inf Process Lett"},{"key":"1286_CR27","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.ins.2020.01.006","volume":"518","author":"GK Verma","year":"2020","unstructured":"Verma GK, Singh BB, Kumar N, Obaidat MS, He D, Singh H. An efficient and provable certificate-based proxy signature scheme for IIoT environment. Inf Sci. 2020;518:142\u201356.","journal-title":"Inf Sci"},{"issue":"2","key":"1286_CR28","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1631\/FITEE.1500197","volume":"17","author":"J Xie","year":"2016","unstructured":"Xie J, Hu Y-P, Gao J-T, Gao W. Efficient identity-based signature over ntru lattice. Front Info Tech Elect Eng. 2016;17(2):135\u201342.","journal-title":"Front Info Tech Elect Eng"},{"key":"1286_CR29","doi-asserted-by":"crossref","unstructured":"Zhu H, Tan Y-A, Zhu L, Wang X, Zhang Q, Li Y. An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors. 2018;18(5)","DOI":"10.3390\/s18051663"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01286-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-022-01286-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-022-01286-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,12]],"date-time":"2023-02-12T16:04:28Z","timestamp":1676217868000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-022-01286-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,26]]},"references-count":29,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["1286"],"URL":"https:\/\/doi.org\/10.1007\/s42979-022-01286-8","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,26]]},"assertion":[{"value":"7 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"398"}}