{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T20:33:17Z","timestamp":1772915597034,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61562012"],"award-info":[{"award-number":["61562012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962011"],"award-info":[{"award-number":["61962011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010828","name":"Department of Education of Guizhou Province","doi-asserted-by":"publisher","award":["KY[2016]026"],"award-info":[{"award-number":["KY[2016]026"]}],"id":[{"id":"10.13039\/501100010828","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guizhou Provincial Science and Technology Foundation","award":["[2019]1434"],"award-info":[{"award-number":["[2019]1434"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2981360","type":"journal-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T21:04:29Z","timestamp":1584479069000},"page":"54641-54651","source":"Crossref","is-referenced-by-count":20,"title":["Certificateless Linkable Ring Signature Scheme"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9688-1062","authenticated-orcid":false,"given":"Lunzhi","family":"Deng","sequence":"first","affiliation":[]},{"given":"Hongyu","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77090-9_66"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7696858"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75670-5_7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1051\/ita\/2016013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2948972"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E95.A.151"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24582-7_20"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2231-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E92.A.322"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11424826_65"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISME.2010.113"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01950-1_18"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16280-0_11"},{"key":"ref3","first-page":"452","article-title":"Certificateless public cryptography","volume":"2894","author":"al-riyami","year":"2003","journal-title":"Advances in Cryptology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.06.017"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxs115"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93638-3_15"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11958239_12"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99807-7_11"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.10.031"},{"key":"ref9","article-title":"Certificateless ring signature","author":"chow","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/11941378_26"},{"key":"ref20","article-title":"Ring signature confidential transactions for Monero","author":"noether","year":"2015"},{"key":"ref22","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","volume":"196","author":"shamir","year":"1984","journal-title":"Advances in Cryptology CRYPTO"},{"key":"ref21","first-page":"552","article-title":"How to leak a secret","volume":"2248","author":"rivest","year":"2001","journal-title":"Adv Cryptology"},{"key":"ref24","first-page":"558","article-title":"Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice RingCT v1.0)","volume":"10946","author":"torres","year":"2018","journal-title":"Proc Australasian Conf Inf Security Privacy"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31979-5_5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30556-9_30"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09039625.pdf?arnumber=9039625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T01:08:14Z","timestamp":1641949694000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9039625\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2981360","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}