{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T07:31:15Z","timestamp":1768721475157,"version":"3.49.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003009","name":"Science and Technology Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003009","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,8]]},"DOI":"10.1109\/cscwd61410.2024.10580227","type":"proceedings-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T17:21:49Z","timestamp":1720632109000},"page":"2454-2459","source":"Crossref","is-referenced-by-count":3,"title":["A new SM2-based ring signature scheme with revocability and anonymity"],"prefix":"10.1109","author":[{"given":"Changsong","family":"Yang","sequence":"first","affiliation":[{"name":"Guilin University of Electronic Technology,Guangxi Key Laboratory of Cryptography and Information Security,Guilin,China"}]},{"given":"Ping","family":"Li","sequence":"additional","affiliation":[{"name":"Guilin University of Electronic Technology,Guangxi Key Laboratory of Cryptography and Information Security,Guilin,China"}]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[{"name":"Guilin University of Electronic Technology,Guangxi Key Laboratory of Cryptography and Information Security,Guilin,China"}]},{"given":"Xiaoling","family":"Tao","sequence":"additional","affiliation":[{"name":"Guilin University of Electronic Technology,Guangxi Key Laboratory of Cryptography and Information Security,Guilin,China"}]},{"given":"Huiyong","family":"Wang","sequence":"additional","affiliation":[{"name":"Guilin University of Electronic Technology,School of Mathematics &#x0026; Computing Science,Guilin,China"}]},{"given":"Ruwen","family":"Zhao","sequence":"additional","affiliation":[{"name":"Guilin University of Electronic Technology,School of Mathematics &#x0026; Computing Science,Guilin,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.11.009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-9426-2.ch007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11460-008-0012-8"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(79)90007-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14296\/deeslr.v2i0.1755"},{"issue":"4","key":"ref6","first-page":"710","article-title":"Ring signature schemes based on sm2 digital signature algorithm","volume":"8","author":"Qing","year":"2021","journal-title":"Journal of Cryptologic Research"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36178-2_33"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.19"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_30"},{"issue":"5","key":"ref12","first-page":"985","article-title":"Research progress and prospect of ring signatures","volume":"17","author":"Jia","year":"2023","journal-title":"Journal of Frontiers of Computer Science & Technology"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-007-9096-5"},{"issue":"24","key":"ref15","article-title":"Ring signature scheme with revocable anonymity","volume":"46","author":"Huang","year":"2010","journal-title":"Jisuanji Gongcheng yu Yingyong(Computer Engineering and Applications)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42921-8_1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2020016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8021267"},{"issue":"2","key":"ref19","first-page":"264","article-title":"Deniable ring signature scheme based on sm2 digital signature algorithm","volume":"10","author":"Bao","year":"2023","journal-title":"Journal of Cryptologic Research"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1916\/1\/012079"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24582-7_20"}],"event":{"name":"2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","location":"Tianjin, China","start":{"date-parts":[[2024,5,8]]},"end":{"date-parts":[[2024,5,10]]}},"container-title":["2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10579968\/10579982\/10580227.pdf?arnumber=10580227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T04:52:25Z","timestamp":1721191945000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10580227\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cscwd61410.2024.10580227","relation":{},"subject":[],"published":{"date-parts":[[2024,5,8]]}}}