{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:56:09Z","timestamp":1764996969346,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/icnidc.2012.6418835","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T17:53:56Z","timestamp":1359568436000},"page":"646-651","source":"Crossref","is-referenced-by-count":4,"title":["A lattice-based digital signature from the Ring-LWE"],"prefix":"10.1109","author":[{"given":"Yanfang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qiaoyan","family":"Wen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1132516.1132581"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(01)00290-0"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1089023.1089027"},{"key":"13","first-page":"271","article-title":"Learning a parallelepiped: Cryptanalysis of GGH and NTRU signatures","author":"nguyen","year":"2006","journal-title":"Eurocrypt"},{"key":"14","first-page":"505","article-title":"Fully homomorphic encryption from Ring-LWE and security for key dependent messages","author":"brakerski","year":"2011","journal-title":"Proc of CRYPTO"},{"key":"11","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1007\/978-3-540-71039-4_4","article-title":"A Swifft: A modest proposal for FFT hashing","author":"lyubashevsky","year":"2008","journal-title":"Fast Software Encryption (FSE) 2008"},{"key":"12","first-page":"523","article-title":"Bonsai trees, or how to delegate a lattice basis","author":"cash","year":"2010","journal-title":"Eurocrypt"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237838"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78524-8_3"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"6","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1007\/978-3-642-13190-5_28","article-title":"Efficient lattice (H) IBE in the standard model","volume":"6110","author":"agrawal","year":"2010","journal-title":"Eurocrypt 2010"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536461"},{"key":"9","first-page":"122","article-title":"NTRUSIGN: Digital signatures using the NTRU lattice","author":"hoffstein","year":"2003","journal-title":"CT-RSA"},{"key":"8","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/BFb0052231","article-title":"Public-Key Cryptosystems from Lattice Reduction Problems","author":"goldreich","year":"1997","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"2012 3rd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC 2012)","start":{"date-parts":[[2012,9,21]]},"location":"Beijing, China","end":{"date-parts":[[2012,9,23]]}},"container-title":["2012 3rd IEEE International Conference on Network Infrastructure and Digital Content"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6410480\/6418700\/06418835.pdf?arnumber=6418835","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T02:42:30Z","timestamp":1498012950000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6418835\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icnidc.2012.6418835","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}