{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T22:10:04Z","timestamp":1747951804772,"version":"3.41.0"},"reference-count":62,"publisher":"Oxford University Press (OUP)","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The Computer Journal"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1093\/comjnl\/bxv026","type":"journal-article","created":{"date-parts":[[2015,4,23]],"date-time":"2015-04-23T02:11:36Z","timestamp":1429755096000},"page":"2698-2715","source":"Crossref","is-referenced-by-count":15,"title":["Revocable Group Signature with Constant-Size Revocation List"],"prefix":"10.1093","volume":"58","author":[{"given":"Nuttapong","family":"Attrapadung","sequence":"first","affiliation":[]},{"given":"Keita","family":"Emura","sequence":"additional","affiliation":[]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[]},{"given":"Yusuke","family":"Sakai","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2015,4,22]]},"reference":[{"key":"2015092807580545000_58.10.2698.1","doi-asserted-by":"crossref","unstructured":"Attrapadung N. Emura K. Hanaoka G. Sakai Y. (2014) A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List. Applied Cryptography and Network Security\u2014Proc. 12th Int. Conf., ACNS 2014, Lausanne, Switzerland, June 10\u201313, pp. 419\u2013437. Springer, Berlin.","DOI":"10.1007\/978-3-319-07536-5_25"},{"key":"2015092807580545000_58.10.2698.2","doi-asserted-by":"crossref","unstructured":"Chaum D. van Heyst E. (1991) Group Signatures. Proc. Advances in Cryptology\u2014EUROCRYPT \u201991, Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8\u201311, pp. 257\u2013265. Springer, Berlin.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"2015092807580545000_58.10.2698.3","doi-asserted-by":"crossref","unstructured":"Boneh D. Shacham H. (2004) Group Signatures with Verifier-Local Revocation. Proc. 11th ACM Conf. Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25\u201329, pp. 168\u2013177. ACM, New York, NY, USA.","DOI":"10.1145\/1030083.1030106"},{"key":"2015092807580545000_58.10.2698.4","doi-asserted-by":"crossref","unstructured":"Bringer J. Patey A. (2012) VLR Group Signatures\u2014How to Achieve Both Backward Unlinkability and Efficient Revocation Checks. SECRYPT, pp. 215\u2013220. SciTePress, Setubal.","DOI":"10.5220\/0004017502150220"},{"key":"2015092807580545000_58.10.2698.5","doi-asserted-by":"crossref","unstructured":"Chu C. Liu J.K. Huang X. Zhou J. (2012) Verifier-Local Revocation Group Signatures with Time-Bound Keys. 7th ACM Symp. Information, Computer and Communications Security, ASIACCS \u201912, Seoul, Korea, May 2\u20134, pp. 26\u201327. ACM, New York, NY, USA.","DOI":"10.1145\/2414456.2414470"},{"key":"2015092807580545000_58.10.2698.6","doi-asserted-by":"crossref","unstructured":"Nakanishi T. Funabiki N. (2005) Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps. Advances in Cryptology\u2014 2005, Proc. 11th Int. Conf. Theory and Application of Cryptology and Information Security, Chennai, India, December 4\u20138, pp. 533\u2013548. springer, Berlin.","DOI":"10.1007\/11593447_29"},{"key":"2015092807580545000_58.10.2698.7","doi-asserted-by":"crossref","unstructured":"Nakanishi T. Funabiki N. (2006) A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability. Advances in Information and Computer Security, Proc. 1st Int. Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23\u201324, pp. 17\u201332. springer, Berlin.","DOI":"10.1007\/11908739_2"},{"key":"2015092807580545000_58.10.2698.8","doi-asserted-by":"crossref","unstructured":"Libert B. Vergnaud D. (2009) Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model. Cryptology and Network Security, Proc. 8th Int. Conf., CANS 2009, Kanazawa, Japan, December 12\u201314, pp. 498\u2013517. springer, Berlin.","DOI":"10.1007\/978-3-642-10433-6_34"},{"key":"2015092807580545000_58.10.2698.9","doi-asserted-by":"crossref","unstructured":"Wei L. Liu J. (2010) Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability. Pairing-Based Cryptography\u2014Pairing 2010\u2014Proc. 4th Int. Conf., Yamanaka Hot Spring, Japan, December, pp. 136\u2013146. springer, Berlin.","DOI":"10.1007\/978-3-642-17455-1_9"},{"key":"2015092807580545000_58.10.2698.10","doi-asserted-by":"crossref","unstructured":"Zhou S. Lin D. (2006) Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. CANS, pp. 126\u2013143. springer, Berlin.","DOI":"10.1007\/11935070_8"},{"key":"2015092807580545000_58.10.2698.11","doi-asserted-by":"crossref","unstructured":"Acar T. Chow S.S.M. Nguyen L. (2013) Accumulators and U-Prove Revocation. Financial Cryptography, pp. 189\u2013196. springer, Berlin.","DOI":"10.1007\/978-3-642-39884-1_15"},{"key":"2015092807580545000_58.10.2698.12","doi-asserted-by":"crossref","unstructured":"Camenisch J. Kohlweiss M. Soriente C. (2009) An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. Public Key Cryptography, pp. 481\u2013500. springer, Berlin.","DOI":"10.1007\/978-3-642-00468-1_27"},{"key":"2015092807580545000_58.10.2698.13","doi-asserted-by":"crossref","unstructured":"Nguyen L. (2005) Accumulators from Bilinear Pairings and Applications. CT-RSA, pp. 275\u2013292. springer, Berlin.","DOI":"10.1007\/978-3-540-30574-3_19"},{"key":"2015092807580545000_58.10.2698.14","doi-asserted-by":"crossref","unstructured":"Nakanishi T. Fujii H. Hira Y. Funabiki N. (2009) Revocable Group Signature Schemes with Constant Costs for Signing and Verifying. Public Key Cryptography\u2014PKC 2009, Proc. 12th Int. Conf. Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18\u201320, pp. 463\u2013480. springer, Berlin.","DOI":"10.1007\/978-3-642-00468-1_26"},{"key":"2015092807580545000_58.10.2698.15","doi-asserted-by":"crossref","unstructured":"Libert B. Peters T. Yung M. (2012) Group Signatures with Almost-for-Free Revocation. Advances in Cryptology\u2014CRYPTO 2012\u2014 Proc. 32nd Annual Cryptology Conf., Santa Barbara, CA, USA, August 19\u201323, pp. 571\u2013589. springer, Berlin.","DOI":"10.1007\/978-3-642-32009-5_34"},{"key":"2015092807580545000_58.10.2698.16","doi-asserted-by":"crossref","unstructured":"Fan C. Hsu R. Manulis M. (2011) Group Signature with Constant Revocation Costs for Signers and Verifiers. Cryptology and Network Security\u2014Proc. 10th Int. Conf., CANS 2011, Sanya, China, December 10\u201312, pp. 214\u2013233. springer, Berlin.","DOI":"10.1007\/978-3-642-25513-7_16"},{"key":"2015092807580545000_58.10.2698.17","doi-asserted-by":"crossref","unstructured":"Libert B. Peters T. Yung M. (2012) Scalable Group Signatures with Revocation. Advances in Cryptology\u2014EUROCRYPT 2012\u2014Proc. 31st Annual Int. Conf. Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15\u201319, pp. 609\u2013627. springer, Berlin.","DOI":"10.1007\/978-3-642-29011-4_36"},{"key":"2015092807580545000_58.10.2698.18","doi-asserted-by":"crossref","unstructured":"Naor D. Naor M. Lotspiech J. (2001) Revocation and Tracing Schemes for Stateless Receivers. Advances in Cryptology\u2014 2001, Proc. 21st Annual Int. Cryptology Conf., Santa Barbara, CA, USA, August 19\u201323, pp. 41\u201362. springer, Berlin.","DOI":"10.1007\/3-540-44647-8_3"},{"key":"2015092807580545000_58.10.2698.19","doi-asserted-by":"crossref","unstructured":"Dodis Y. Fazio N. (2002) Public Key Broadcast Encryption for Stateless Receivers. Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, Revised Papers, pp. 61\u201380. ACM, New York, NY, USA.","DOI":"10.1007\/978-3-540-44993-5_5"},{"key":"2015092807580545000_58.10.2698.20","doi-asserted-by":"crossref","unstructured":"Naor M. (2002) Deniable Ring Authentication. Advances in Cryptology\u2014CRYPTO 2002, Proc. 22nd Annual Int. Cryptology Conf., Santa Barbara, CA, USA, August 18\u201322, pp. 481\u2013498. springer, Berlin.","DOI":"10.1007\/3-540-45708-9_31"},{"key":"2015092807580545000_58.10.2698.21","doi-asserted-by":"crossref","unstructured":"Yamada S. Attrapadung N. Santoso B. Schuldt J.C.N. Hanaoka G. Kunihiro N. (2012) Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication. Public Key Cryptography\u2014PKC 2012\u2014Proc. 15th Int. Conf. Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21\u201323, pp. 243\u2013261. springer, Berlin.","DOI":"10.1007\/978-3-642-30057-8_15"},{"key":"2015092807580545000_58.10.2698.22","doi-asserted-by":"crossref","unstructured":"Boneh D. Boyen X. Goh E. (2005) Hierarchical Identity Based Encryption with Constant Size Ciphertext. Advances in Cryptology\u2014 2005, Proc. 24th Annual Int. Conf. Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22\u201326, pp. 440\u2013456. springer, Berlin.","DOI":"10.1007\/11426639_26"},{"key":"2015092807580545000_58.10.2698.23","doi-asserted-by":"crossref","unstructured":"Boneh D. Boyen X. (2004) Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. Advances in Cryptology\u2014EUROCRYPT 2004, Proc. Int. Conf. Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2\u20136, pp. 223\u2013238. springer, Berlin.","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"2015092807580545000_58.10.2698.24","doi-asserted-by":"crossref","unstructured":"Boneh D. Gentry C. Waters B. (2005) Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. Advances in Cryptology\u2014CRYPTO 2005: Proc. 25th Annual Int. Cryptology Conf., Santa Barbara, CA, USA, August 14\u201318, pp. 258\u2013275. springer, Berlin.","DOI":"10.1007\/11535218_16"},{"key":"2015092807580545000_58.10.2698.25","doi-asserted-by":"crossref","unstructured":"Libert B. Yung M. (2010) Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs. Theory of Cryptography, Proc. 7th Theory of Cryptography Conf., TCC 2010, Zurich, Switzerland, February 9\u201311, pp. 499\u2013517. springer, Berlin.","DOI":"10.1007\/978-3-642-11799-2_30"},{"key":"2015092807580545000_58.10.2698.26","doi-asserted-by":"crossref","unstructured":"Abe M. Fuchsbauer G. Groth J. Haralambiev K. Ohkubo M. (2010) Structure-Preserving Signatures and Commitments to Group Elements. Advances in Cryptology\u2013CRYPTO 2010, Proc 30th Annual Int. Cryptology Conf., Santa Barbara, California, USA, August 15\u201319, 2010, pp. 209\u2013236. springer-Verlag, Berlin.","DOI":"10.1007\/978-3-642-14623-7_12"},{"key":"2015092807580545000_58.10.2698.27","unstructured":"Abe M. Haralambiev K. Ohkubo M. (2010) Signing on elements in bilinear groups for modular protocol design. IACR Cryptol. ePrint Arch., 2010, 133."},{"key":"2015092807580545000_58.10.2698.28","doi-asserted-by":"crossref","unstructured":"Nakanishi T. Funabiki N. (2013) Revocable Group Signatures with Compact Revocation List using Accumulators. Information Security and Cryptology\u2014ICISC 2013\u201416th Int. Conf., Seoul, Korea, November 27\u201329, Revised Selected Papers, pp. 435\u2013451. springer, Berlin.","DOI":"10.1007\/978-3-319-12160-4_26"},{"key":"2015092807580545000_58.10.2698.29","doi-asserted-by":"crossref","unstructured":"Groth J. (2006) Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. Advances in Cryptology\u2014ASIACRYPT 2006, Proc. 12th Int. Conf. Theory and Application of Cryptology and Information Security, Shanghai, China, December 3\u20137, pp. 444\u2013459. springer, Berlin.","DOI":"10.1007\/11935230_29"},{"key":"2015092807580545000_58.10.2698.30","doi-asserted-by":"crossref","unstructured":"Lewko A.B. Sahai A. Waters B. (2010) Revocation Systems with Very Small Private Keys. 31st IEEE Symp. Security and Privacy, S & P 2010, Berleley\/Oakland, CA, USA, May 16\u201319, pp. 273\u2013285. IEEE Computer Society, Los Alamitos, CA, USA.","DOI":"10.1109\/SP.2010.23"},{"key":"2015092807580545000_58.10.2698.31","doi-asserted-by":"crossref","unstructured":"Attrapadung N. Libert B. de Panafieu E. (2011) Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. Public Key Cryptography\u2014PKC 2011\u2014Proc. 14th Int. Conf. Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6\u20139, pp. 90\u2013108. springer, Berlin.","DOI":"10.1007\/978-3-642-19379-8_6"},{"key":"2015092807580545000_58.10.2698.32","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2011.12.004"},{"key":"2015092807580545000_58.10.2698.33","doi-asserted-by":"crossref","unstructured":"Boneh D. Boyen X. Shacham H. (2004) Short Group Signatures. Advances in Cryptology\u2014CRYPTO 2004, Proc. 24th Annual Int. Cryptology Conf., Santa Barbara, CA, USA, August 15\u201319, pp. 41\u201355. springer, Berlin.","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"2015092807580545000_58.10.2698.34","doi-asserted-by":"crossref","unstructured":"Delerabl\u00e9e C. Pointcheval D. (2006) Dynamic Fully Anonymous Short Group Signatures. Progression Cryptology\u2014VIETCRYPT 2006, st Int. Conf. Cryptology in Vietnam, Hanoi, Vietnam, September 25\u201328, Revised Selected Papers, pp. 193\u2013210. springer, Berlin.","DOI":"10.1007\/11958239_13"},{"key":"2015092807580545000_58.10.2698.35","doi-asserted-by":"crossref","unstructured":"Furukawa J. Imai H. (2006) An efficient group signature scheme from bilinear maps. IEICE Trans., 89-A, 1328\u20131338.","DOI":"10.1093\/ietfec\/e89-a.5.1328"},{"key":"2015092807580545000_58.10.2698.36","doi-asserted-by":"crossref","unstructured":"Bellare M. Micciancio D. Warinschi B. (2003) Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions. Advances in Cryptology\u2014EUROCRYPT 2003, Proc. Int. Conf. Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4\u20138, pp. 614\u2013629. springer, Berlin.","DOI":"10.1007\/3-540-39200-9_38"},{"key":"2015092807580545000_58.10.2698.37","doi-asserted-by":"crossref","unstructured":"Bellare M. Shi H. Zhang C. (2005) Foundations of Group Signatures: The Case of Dynamic Groups. Topics in Cryptology\u2014CT-RSA 2005, Proc. the Cryptographers\u2019 Track at the RSA Conf. 2005, San Francisco, CA, USA, February 14\u201318, pp. 136\u2013153. springer, Berlin.","DOI":"10.1007\/978-3-540-30574-3_11"},{"key":"2015092807580545000_58.10.2698.38","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2006.010821"},{"key":"2015092807580545000_58.10.2698.39","unstructured":"Kiayias A. Yung M. (2004) Group signatures: provable security, efficient constructions and anonymity from trapdoor-holders. IACR Cryptol. ePrint Arch., 2004, 76."},{"key":"2015092807580545000_58.10.2698.40","doi-asserted-by":"crossref","unstructured":"Sakai Y. Schuldt J.C.N. Emura K. Hanaoka G. Ohta K. (2012) On the Security of Dynamic Group Signatures: Preventing Signature Hijacking. Public Key Cryptography\u2014PKC 2012\u2014Proc. 15th Int. Conf. Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21\u201323, pp. 715\u2013732. springer, Berlin.","DOI":"10.1007\/978-3-642-30057-8_42"},{"key":"2015092807580545000_58.10.2698.41","doi-asserted-by":"crossref","unstructured":"Abdalla M. Warinschi B. (2004) On the Minimal Assumptions of Group Signature Schemes. Information and Communications Security, Proc. 6th Int. Conf., ICICS 2004, Malaga, Spain, October 27\u201329, pp. 1\u201313. springer, Berlin.","DOI":"10.1007\/978-3-540-30191-2_1"},{"key":"2015092807580545000_58.10.2698.42","doi-asserted-by":"crossref","unstructured":"Ohtake G. Fujii A. Hanaoka G. Ogawa K. (2009) On the Theoretical Gap Between Group Signatures with and without Unlinkability. Progress in Cryptology\u2014AFRICACRYPT 2009, Proc. 2nd Int. Conf. Cryptology in Africa, Gammarth, Tunisia, June 21\u201325, pp. 149\u2013166. springer, Berlin.","DOI":"10.1007\/978-3-642-02384-2_10"},{"key":"2015092807580545000_58.10.2698.43","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd I. Hofheinz D. Kiltz E. Thorbek R. (2008) Public-Key Encryption with Non-Interactive Opening. Topics in Cryptology\u2014CT-RSA 2008, Proc. the Cryptographers\u2019 Track at the RSA Conf. 2008, San Francisco, CA, USA, April 8\u201311, pp. 239\u2013255. springer, Berlin.","DOI":"10.1007\/978-3-540-79263-5_15"},{"key":"2015092807580545000_58.10.2698.44","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0204-y"},{"key":"2015092807580545000_58.10.2698.45","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9005-7"},{"key":"2015092807580545000_58.10.2698.46","doi-asserted-by":"crossref","unstructured":"Boyen X. Waters B. (2006) Compact Group Signatures without Random Oracles. Advances in Cryptology\u2014EUROCRYPT 2006, Proc. 25th Annual Int. Conf. Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28\u2013June 1, pp. 427\u2013444. springer, Berlin.","DOI":"10.1007\/11761679_26"},{"key":"2015092807580545000_58.10.2698.47","doi-asserted-by":"crossref","unstructured":"Ateniese G. Camenisch J. Hohenberger S. de Medeiros B. (2005) Practical group signatures without random oracles. IACR Cryptol. ePrint Arch., 2005, 385.","DOI":"10.1007\/978-3-540-30598-9_10"},{"key":"2015092807580545000_58.10.2698.48","doi-asserted-by":"crossref","unstructured":"Groth J. (2007) Fully Anonymous Group Signatures Without Random Oracles. Advances in Cryptology\u2014ASIACRYPT 2007, Proc. 13th Int. Conf. Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2\u20136, pp. 164\u2013180. springer, Berlin.","DOI":"10.1007\/978-3-540-76900-2_10"},{"key":"2015092807580545000_58.10.2698.49","doi-asserted-by":"crossref","unstructured":"Groth J. Sahai A. (2008) Efficient Non-Interactive Proof Systems for Bilinear Groups. Advances in Cryptology\u2014EUROCRYPT 2008, Proc. 27th Annual Int. Conf. Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13\u201317, pp. 415\u2013432. springer, Berlin.","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"2015092807580545000_58.10.2698.50","doi-asserted-by":"crossref","unstructured":"Emura K. Miyaji A. Omote K. (2014) An $r$ -hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users. J. Appl. Math., 2014, doi.org\/10.1155\/2014\/983040.","DOI":"10.1155\/2014\/983040"},{"key":"2015092807580545000_58.10.2698.51","doi-asserted-by":"crossref","unstructured":"Begum N. Nakanishi T. Funabiki N. (2012) Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System. Information Security and Cryptology\u2014ICISC 2012\u201415th Int. Conf., Seoul, Korea, November 28\u201330, Revised Selected Papers, pp. 495\u2013509. springer, Berlin.","DOI":"10.1007\/978-3-642-37682-5_35"},{"key":"2015092807580545000_58.10.2698.52","doi-asserted-by":"crossref","unstructured":"Attrapadung N. Libert B. (2010) Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation. Public Key Cryptography\u2014PKC 2010, Proc. 13th Int. Conf. Practice and Theory in Public Key Cryptography, Paris, France, May 26\u201328, pp. 384\u2013402. springer, Berlin.","DOI":"10.1007\/978-3-642-13013-7_23"},{"key":"2015092807580545000_58.10.2698.53","doi-asserted-by":"crossref","unstructured":"Attrapadung N. Libert B. (2012) Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation. J. Math. Cryptol., 5, 115\u2013158.","DOI":"10.1515\/jmc.2011.009"},{"key":"2015092807580545000_58.10.2698.54","doi-asserted-by":"crossref","unstructured":"Boneh D. Hamburg M. (2008) Generalized Identity Based and Broadcast Encryption Schemes. Advances in Cryptology\u2014ASIACRYPT 2008, Proc. 14th Int. Conf. Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7\u201311, pp. 455\u2013470. springer, Berlin.","DOI":"10.1007\/978-3-540-89255-7_28"},{"key":"2015092807580545000_58.10.2698.55","doi-asserted-by":"crossref","unstructured":"Kiltz E. (2006) Chosen-Ciphertext Security from Tag-based Encryption. Theory of Cryptography, Proc. 3rd Theory of Cryptography Conf., TCC 2006, New York, NY, USA, March 4\u20137, pp. 581\u2013600. springer, Berlin.","DOI":"10.1007\/11681878_30"},{"key":"2015092807580545000_58.10.2698.56","doi-asserted-by":"crossref","unstructured":"Benjumea V. Lopez J. Montenegro J.A. Troya J.M. (2004) A First Approach to Provide Anonymity in Attribute Certificates. Public Key Cryptography\u2014PKC 2004, 7th Int. Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1\u20134, pp. 402\u2013415. springer, Berlin.","DOI":"10.1007\/978-3-540-24632-9_29"},{"key":"2015092807580545000_58.10.2698.57","doi-asserted-by":"crossref","unstructured":"Benjumea V. Choi S.G. Lopez J. Yung M. (2007) Anonymity 2.0\u2014X.509 Extensions Supporting Privacy-Friendly Authentication. Cryptology and Network Security, Proc. 6th Int. Conf., CANS 2007, Singapore, December 8\u201310, pp. 265\u2013281. springer, Berlin.","DOI":"10.1007\/978-3-540-76969-9_17"},{"key":"2015092807580545000_58.10.2698.58","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.02.016"},{"key":"2015092807580545000_58.10.2698.59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.06.009"},{"key":"2015092807580545000_58.10.2698.60","doi-asserted-by":"crossref","unstructured":"Diaz J. Arroyo D. Rodriguez F.B. (2012) Anonymity Revocation Through Standard Infrastructures. Public Key Infrastructures, Services and Applications\u20149th European Workshop, EuroPKI 2012, Pisa, Italy, September 13\u201314, Revised Selected Papers, pp. 112\u2013127. springer, Berlin.","DOI":"10.1007\/978-3-642-40012-4_8"},{"key":"2015092807580545000_58.10.2698.61","doi-asserted-by":"crossref","unstructured":"Kiayias A. Tsiounis Y. Yung M. (2004) Traceable Signatures. Advances in Cryptology\u2014EUROCRYPT 2004, Proc. Int. Conf. Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2\u20136, pp. 571\u2013589. springer, Berlin.","DOI":"10.1007\/978-3-540-24676-3_34"},{"key":"2015092807580545000_58.10.2698.62","doi-asserted-by":"crossref","unstructured":"Choi S.G. Park K. Yung M. (2006) Short Traceable Signatures Based on Bilinear Pairings. Advances in Information and Computer Security, Proc. 1st Int. Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23\u201324, pp. 88\u2013103. springer, Berlin.","DOI":"10.1007\/11908739_7"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/58\/10\/2698\/5095452\/bxv026.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T21:37:10Z","timestamp":1747949830000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article-lookup\/doi\/10.1093\/comjnl\/bxv026"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,22]]},"references-count":62,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2015,9,28]]},"published-print":{"date-parts":[[2015,10]]}},"alternative-id":["10.1093\/comjnl\/bxv026"],"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxv026","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published":{"date-parts":[[2015,4,22]]}}}