{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:20:31Z","timestamp":1762507231135},"reference-count":27,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2017,11,24]],"date-time":"2017-11-24T00:00:00Z","timestamp":1511481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1093\/comjnl\/bxx112","type":"journal-article","created":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T12:07:06Z","timestamp":1509970026000},"page":"545-560","source":"Crossref","is-referenced-by-count":9,"title":["Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols"],"prefix":"10.1093","volume":"61","author":[{"given":"Siyuan","family":"Chen","sequence":"first","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, PR China"}]},{"given":"Peng","family":"Zeng","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, PR China"}]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX 78249, USA"}]},{"given":"Xiaolei","family":"Dong","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, PR China"}]}],"member":"286","published-online":{"date-parts":[[2017,11,24]]},"reference":[{"key":"key\n\t\t\t\t20180329074328_bxx112C1","author":"Chaum","year":"1991"},{"key":"key\n\t\t\t\t20180329074328_bxx112C2","author":"Rivest","year":"2001"},{"key":"key\n\t\t\t\t20180329074328_bxx112C3","author":"Chen","year":"2016"},{"key":"key\n\t\t\t\t20180329074328_bxx112C4","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.ins.2014.12.019","article-title":"An efficient ring signature scheme from pairings","volume":"300","author":"Shim","year":"2015","journal-title":"Inf. Sci."},{"key":"key\n\t\t\t\t20180329074328_bxx112C5","author":"Bootle","year":"2015"},{"key":"key\n\t\t\t\t20180329074328_bxx112C6","author":"Libert","year":"2016"},{"key":"key\n\t\t\t\t20180329074328_bxx112C7","author":"Ling","year":"2015"},{"key":"key\n\t\t\t\t20180329074328_bxx112C8","author":"Benhamouda","year":"2014"},{"key":"key\n\t\t\t\t20180329074328_bxx112C9","author":"Shor","year":"1994"},{"key":"key\n\t\t\t\t20180329074328_bxx112C10","doi-asserted-by":"crossref","first-page":"1068","DOI":"10.1126\/science.aad9480","article-title":"Realization of a scalable Shor algorithm","volume":"351","author":"Monz","year":"2016","journal-title":"Science"},{"key":"key\n\t\t\t\t20180329074328_bxx112C11","author":"Mceliece","year":"1978"},{"key":"key\n\t\t\t\t20180329074328_bxx112C12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-88702-7","volume-title":"Post-quantum Cryptography","author":"Bernstein","year":"2009"},{"key":"key\n\t\t\t\t20180329074328_bxx112C13","author":"Alam\u00e9lou","year":"2015"},{"key":"key\n\t\t\t\t20180329074328_bxx112C14","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s10623-016-0276-6","article-title":"A code-based group signature scheme","volume":"82","author":"Alam\u00e9lou","year":"2017","journal-title":"Des. Codes Cryptogr."},{"key":"key\n\t\t\t\t20180329074328_bxx112C15","author":"Ezerman","year":"2015"},{"key":"key\n\t\t\t\t20180329074328_bxx112C16","doi-asserted-by":"crossref","first-page":"1757","DOI":"10.1109\/18.556672","article-title":"A new paradigm for public key identification","volume":"42","author":"Stern","year":"1996","journal-title":"IEEE Trans. Inf. Theory"},{"key":"key\n\t\t\t\t20180329074328_bxx112C17","author":"Fiat","year":"1986"},{"key":"key\n\t\t\t\t20180329074328_bxx112C18","first-page":"154","article-title":"Code-Based Ring Signature Scheme","volume":"5","author":"Zheng","year":"2007","journal-title":"IJ Netw. Secur."},{"key":"key\n\t\t\t\t20180329074328_bxx112C19","author":"Courtois","year":"2001"},{"key":"key\n\t\t\t\t20180329074328_bxx112C20","author":"Cayrel","year":"2010"},{"key":"key\n\t\t\t\t20180329074328_bxx112C21","author":"Cayrel","year":"2012"},{"key":"key\n\t\t\t\t20180329074328_bxx112C22","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/s10623-008-9175-9","article-title":"Semantic security for the McEliece cryptosystem without random oracles","volume":"49","author":"Nojima","year":"2008","journal-title":"Des. Codes Cryptogr."},{"key":"key\n\t\t\t\t20180329074328_bxx112C23","author":"Peters","year":"2010"},{"key":"key\n\t\t\t\t20180329074328_bxx112C24","first-page":"23","article-title":"Some new NP-complete coding problems","volume":"30","author":"Barg","year":"1994","journal-title":"Probl. Peredachi Inf"},{"key":"key\n\t\t\t\t20180329074328_bxx112C25","author":"D\u00f6ttling","year":"2014"},{"key":"key\n\t\t\t\t20180329074328_bxx112C26","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/TIT.1975.1055350","article-title":"The algebraic decoding of Goppa codes","volume":"21","author":"Patterson","year":"1975","journal-title":"IEEE Trans. Inf. Theory"},{"key":"key\n\t\t\t\t20180329074328_bxx112C27","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/BF02351717","article-title":"Zero-knowledge proofs of identity","volume":"1","author":"Feige","year":"1988","journal-title":"J. Cryptol."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/4\/545\/24509690\/bxx112.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T17:35:28Z","timestamp":1570296928000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/4\/545\/4656252"}},"subtitle":[],"editor":[{"given":"Liqun","family":"Chen","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2017,11,24]]},"references-count":27,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2017,11,24]]},"published-print":{"date-parts":[[2018,4,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx112","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,4]]},"published":{"date-parts":[[2017,11,24]]}}}