{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T14:35:42Z","timestamp":1774190142134,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128861","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"297-302","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":63,"title":["Ring signatures without random oracles"],"prefix":"10.1145","author":[{"given":"Sherman S. M.","family":"Chow","sequence":"first","affiliation":[{"name":"New York University, NY"}]},{"given":"Victor K.","family":"Wei","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shatin, Hong Kong"}]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Bristol, Bristol, UK"}]},{"given":"Tsz Hon","family":"Yuen","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shatin, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"M.\n       \n      Abe M.\n       \n      Ohkubo and \n      \n      \n      K.\n       \n      Suzuki\n      \n  \n  . \n  1-out-of-n Signatures from a Variety of Keys. In Y. Zheng editor Advances in Cryptology - ASIACRYPT\n   \n  2002 Proceedings volume \n  2501\n   of \n  Lecture Notes in Computer Science pages \n  415\n  --\n  432\n  . \n  Springer 2002.]]   M. Abe M. Ohkubo and K. Suzuki. 1-out-of-n Signatures from a Variety of Keys. In Y. Zheng editor Advances in Cryptology - ASIACRYPT 2002 Proceedings volume 2501 of Lecture Notes in Computer Science pages 415--432. Springer 2002.]]","DOI":"10.1007\/3-540-36178-2_26"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"M.\n       \n      Bellare A.\n       \n      Boldyreva and \n      \n      \n      A.\n       \n      Palacio\n      \n  \n  . \n  An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. In C. Cachin and J. Camenisch editors Advances in Cryptology - EUROCRYPT\n   \n  2004 Proceedings volume \n  3027\n   of \n  Lecture Notes in Computer Science pages \n  171\n  --\n  188\n  . \n  Springer 2004.]]  M. Bellare A. Boldyreva and A. Palacio. An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. In C. Cachin and J. Camenisch editors Advances in Cryptology - EUROCRYPT 2004 Proceedings volume 3027 of Lecture Notes in Computer Science pages 171--188. Springer 2004.]]","DOI":"10.1007\/978-3-540-24676-3_11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"M.\n       \n      Bellare D.\n       \n      Micciancio and \n      \n      \n      B.\n       \n      Warinschi\n      \n  \n  . \n  Foundations of Group Signatures: Formal Definitions Simplified Requirements and a Construction Based on General Assumptions. In E. Biham editor Advances in Cryptology - EUROCRYPT\n   \n  2003 Proceedings volume \n  2656\n   of \n  Lecture Notes in Computer Science pages \n  614\n  --\n  629\n  . \n  Springer 2003.]]  M. Bellare D. Micciancio and B. Warinschi. Foundations of Group Signatures: Formal Definitions Simplified Requirements and a Construction Based on General Assumptions. In E. Biham editor Advances in Cryptology - EUROCRYPT 2003 Proceedings volume 2656 of Lecture Notes in Computer Science pages 614--629. Springer 2003.]]","DOI":"10.1007\/3-540-39200-9_38"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"D.\n       \n      Boneh\n     and \n      \n      \n      X.\n       \n      Boyen\n      \n  \n  . \n  Short signatures without random oracles. In C. Cachin and J. Camenisch editors Advances in Cryptology - EUROCRYPT\n   \n  2004 Proceedings volume \n  3027\n   of \n  Lecture Notes in Computer Science pages \n  56\n  --\n  73\n  . \n  Springer 2004.]]  D. Boneh and X. Boyen. Short signatures without random oracles. In C. Cachin and J. Camenisch editors Advances in Cryptology - EUROCRYPT 2004 Proceedings volume 3027 of Lecture Notes in Computer Science pages 56--73. Springer 2004.]]","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"D.\n       \n      Boneh C.\n       \n      Gentry B.\n       \n      Lynn and \n      \n      \n      H.\n       \n      Shacham\n      \n  \n  . \n  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In E. Biham editor Advances in Cryptology - EUROCRYPT\n   \n  2003 Proceedings volume \n  2656\n   of \n  Lecture Notes in Computer Science pages \n  416\n  --\n  432\n  . \n  Springer 2003.]]  D. Boneh C. Gentry B. Lynn and H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In E. Biham editor Advances in Cryptology - EUROCRYPT 2003 Proceedings volume 2656 of Lecture Notes in Computer Science pages 416--432. Springer 2003.]]","DOI":"10.1007\/3-540-39200-9_26"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"D.\n       \n      Boneh B.\n       \n      Lynn and \n      \n      \n      H.\n       \n      Shacham\n      \n  \n  . \n  Short Signatures from the Weil Pairing. In C. Boyd editor Advances in Cryptology - ASIACRYPT\n   \n  2001 Proceedings volume \n  2248\n   of \n  Lecture Notes in Computer Science pages \n  514\n  --\n  532\n  . \n  Springer 2001.]]   D. Boneh B. Lynn and H. Shacham. Short Signatures from the Weil Pairing. In C. Boyd editor Advances in Cryptology - ASIACRYPT 2001 Proceedings volume 2248 of Lecture Notes in Computer Science pages 514--532. Springer 2001.]]","DOI":"10.1007\/3-540-45682-1_30"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"E.\n       \n      Bresson J.\n       \n      Stern and \n      \n      \n      M.\n       \n      Szydlo\n      \n  \n  . \n  Threshold Ring Signatures and Applications to Ad-hoc Groups. In M. Yung editor Advances in Cryptology -- CRYPTO\n   \n  2002 Proceedings volume \n  2442\n   of \n  Lecture Notes in Computer Science pages \n  465\n  --\n  480\n  . \n  Springer 2002.]]   E. Bresson J. Stern and M. Szydlo. Threshold Ring Signatures and Applications to Ad-hoc Groups. In M. Yung editor Advances in Cryptology -- CRYPTO 2002 Proceedings volume 2442 of Lecture Notes in Computer Science pages 465--480. Springer 2002.]]","DOI":"10.1007\/3-540-45708-9_30"},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"B. S. K. Jr.","author":"Camenisch J.","year":"1997"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276741"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"D.\n       \n      Chaum\n     and \n      \n      \n      E.\n       \n      van Heyst\n    .\n      \n  \n   \n  Group signatures. In D. W. Davies editor Advances in Cryptology - EUROCRYPT '91 Proceedings volume \n  547\n   of \n  Lecture Notes in Computer Science pages \n  257\n  --\n  265\n  . \n  Springer 1991\n  .]]  D. Chaum and E. van Heyst. Group signatures. In D. W. Davies editor Advances in Cryptology - EUROCRYPT '91 Proceedings volume 547 of Lecture Notes in Computer Science pages 257--265. Springer 1991.]]","DOI":"10.1007\/3-540-46416-6_22"},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Computer Science","first-page":"218","volume-title":"Information Security and Cryptology - ICISC","author":"Chow S.","year":"2004"},{"key":"e_1_3_2_1_14_1","volume-title":"Third International Conference, ACNS 2005, Proceedings","volume":"3531","author":"Chow S.","year":"2005"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"R.\n       \n      Cramer I.\n       \n      Damg\u00e5rd and \n      \n      \n      B.\n       \n      Schoenmakers\n      \n  \n  . \n  Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Y. Desmedt editor Advances in Cryptology -- CRYPTO '94 Proceedings volume \n  839\n   of \n  Lecture Notes in Computer Science pages \n  174\n  --\n  187\n  . \n  Springer 1994\n  .]]   R. Cramer I. Damg\u00e5rd and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. In Y. Desmedt editor Advances in Cryptology -- CRYPTO '94 Proceedings volume 839 of Lecture Notes in Computer Science pages 174--187. Springer 1994.]]","DOI":"10.1007\/3-540-48658-5_19"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Y.\n       \n      Dodis A.\n       \n      Kiayias A.\n       \n      Nicolosi and \n      \n      \n      V.\n       \n      Shoup\n      \n  \n  . \n  Anonymous Identification in Ad Hoc Groups. In C. Cachin and J. Camenisch editors Advances in Cryptology - EUROCRYPT\n   \n  2004 Proceedings volume \n  3027\n   of \n  Lecture Notes in Computer Science pages \n  609\n  --\n  626\n  . \n  Springer 2004.]]  Y. Dodis A. Kiayias A. Nicolosi and V. Shoup. Anonymous Identification in Ad Hoc Groups. In C. Cachin and J. Camenisch editors Advances in Cryptology - EUROCRYPT 2004 Proceedings volume 3027 of Lecture Notes in Computer Science pages 609--626. Springer 2004.]]","DOI":"10.1007\/978-3-540-24676-3_36"},{"key":"e_1_3_2_1_18_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/978-3-540-30191-2_38","volume-title":"6th International Conference, ICICS","author":"Laguillaumie F.","year":"2004"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"R. L.\n       \n      Rivest A.\n       \n      Shamir and \n      \n      \n      Y.\n       \n      Tauman\n      \n  \n  . \n  How to Leak a Secret. In C. Boyd editor Advances in Cryptology - ASIACRYPT\n   \n  2001 Proceedings volume \n  2248\n   of \n  Lecture Notes in Computer Science pages \n  552\n  --\n  565\n  . \n  Springer 2001.]]   R. L. Rivest A. Shamir and Y. Tauman. How to Leak a Secret. In C. Boyd editor Advances in Cryptology - ASIACRYPT 2001 Proceedings volume 2248 of Lecture Notes in Computer Science pages 552--565. Springer 2001.]]","DOI":"10.1007\/3-540-45682-1_32"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"W.\n       \n      Susilo\n     and \n      \n      \n      Y.\n       \n      Mu\n      \n  \n  . \n  Non-Interactive Deniable Ring Authentication. In J. I. Lim and D. H. Lee editors Information Security and Cryptology - ICISC\n   \n  2003 Revised Papers volume \n  2971\n   of \n  Lecture Notes in Computer Science pages \n  386\n  --\n  401\n  . \n  Springer--Verlag 2004.]]  W. Susilo and Y. Mu. Non-Interactive Deniable Ring Authentication. In J. I. Lim and D. H. Lee editors Information Security and Cryptology - ICISC 2003 Revised Papers volume 2971 of Lecture Notes in Computer Science pages 386--401. Springer--Verlag 2004.]]","DOI":"10.1007\/978-3-540-24691-6_29"},{"key":"e_1_3_2_1_21_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/978-3-540-30191-2_2","volume-title":"6th International Conference, ICICS","author":"Susilo W.","year":"2004"},{"key":"e_1_3_2_1_23_1","series-title":"Lecture Notes in Computer Science","first-page":"163","volume-title":"5th International Workshop, WISA","author":"Xu J.","year":"2004"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"F.\n       \n      Zhang\n     and \n      \n      \n      K.\n       \n      Kim\n      \n  \n  . \n  ID-Based Blind Signature and Ring Signature from Pairings. In Y. Zheng editor Advances in Cryptology - ASIACRYPT\n   \n  2002 Proceedings volume \n  2501\n   of \n  Lecture Notes in Computer Science pages \n  533\n  --\n  547\n  . \n  Springer 2002.]]   F. Zhang and K. Kim. ID-Based Blind Signature and Ring Signature from Pairings. In Y. Zheng editor Advances in Cryptology - ASIACRYPT 2002 Proceedings volume 2501 of Lecture Notes in Computer Science pages 533--547. Springer 2002.]]","DOI":"10.1007\/3-540-36178-2_33"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"F.\n       \n      Zhang R.\n       \n      Safavi-Naini and \n      \n      \n      W.\n       \n      Susilo\n      \n  \n  . \n  An Efficient Signature Scheme from Bilinear Pairings and Its Application. In F. Bao R. H. Deng and J. Zhou editors Public Key Cryptography - PKC\n   \n  2004 Proceedings volume \n  2947\n   of \n  Lecture Notes in Computer Science pages \n  277\n  --\n  290\n  . \n  Springer 2004.]]  F. Zhang R. Safavi-Naini and W. Susilo. An Efficient Signature Scheme from Bilinear Pairings and Its Application. In F. Bao R. H. Deng and J. Zhou editors Public Key Cryptography - PKC 2004 Proceedings volume 2947 of Lecture Notes in Computer Science pages 277--290. Springer 2004.]]","DOI":"10.1007\/978-3-540-24632-9_20"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","location":"Taipei Taiwan","acronym":"Asia CCS06","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128861","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128861"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":22,"alternative-id":["10.1145\/1128817.1128861","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128861","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}