{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:07:17Z","timestamp":1769926037109,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T00:00:00Z","timestamp":1367971200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,8]]},"DOI":"10.1145\/2484313.2484382","type":"proceedings-article","created":{"date-parts":[[2013,5,14]],"date-time":"2013-05-14T12:15:27Z","timestamp":1368533727000},"page":"517-522","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["A group signature scheme with unbounded message-dependent opening"],"prefix":"10.1145","author":[{"given":"Kazuma","family":"Ohara","sequence":"first","affiliation":[{"name":"University of Electro-Communications \/ National Institute of Advanced Industrial Science and Technology, Tokyo and Ibaraki, Japan"}]},{"given":"Yusuke","family":"Sakai","sequence":"additional","affiliation":[{"name":"University of Electro-Communications \/ National Institute of Advanced Industrial Science and Technology, Tokyo and Ibaraki, Japan"}]},{"given":"Keita","family":"Emura","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Tokyo, Japan"}]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2013,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"M.\n      Abe G.\n      Fuchsbauer J.\n      Groth K.\n      Haralambiev and \n      M.\n      Ohkubo\n  . \n  Structure-preserving signatures and commitments to group elements\n  . In T. Rabin editor CRYPTO \n  2010 volume \n  6223\n   of \n  LNCS pages \n  209\n  --\n  236\n  . \n  Springer Heidelberg 2010.   M. Abe G. Fuchsbauer J. Groth K. Haralambiev and M. Ohkubo. Structure-preserving signatures and commitments to group elements. In T. Rabin editor CRYPTO 2010 volume 6223 of LNCS pages 209--236. Springer Heidelberg 2010.","DOI":"10.1007\/978-3-642-14623-7_12"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_19"},{"key":"e_1_3_2_1_4_1","unstructured":"M.\n      Bellare D.\n      Micciancio and \n      B.\n      Warinschi\n  . \n  Foundations of group signatures: Formal definitions simplified requirements and a construction based on general assumptions\n  . In E. Biham editor EUROCRYPT \n  2003 volume \n  2656\n   of \n  LNCS pages \n  644\n  --\n  644\n  . \n  Springer Heidelberg 2003.   M. Bellare D. Micciancio and B. Warinschi. Foundations of group signatures: Formal definitions simplified requirements and a construction based on general assumptions. In E. Biham editor EUROCRYPT 2003 volume 2656 of LNCS pages 644--644. Springer Heidelberg 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30574-3_11"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9005-7"},{"key":"e_1_3_2_1_7_1","unstructured":"D.\n      Boneh X.\n      Boyen and \n      H.\n      Shacham\n  . \n  Short group signatures\n  . In M. Franklin editor CRYPTO \n  2004 volume \n  3152\n   of \n  LNCS pages \n  227\n  --\n  242\n  . \n  Springer Heidelberg 2004.  D. Boneh X. Boyen and H. Shacham. Short group signatures. In M. Franklin editor CRYPTO 2004 volume 3152 of LNCS pages 227--242. Springer Heidelberg 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"D.\n      Chaum\n     and \n      E.\n      van Heyst\n    .\n  Group signatures\n  . In D. W. Davies editor EUROCRYPT '91 volume \n  547\n   of \n  LNCS pages \n  257\n  --\n  265\n  . \n  Springer Heidelberg 1991\n  .   D. Chaum and E. van Heyst. Group signatures. In D. W. Davies editor EUROCRYPT '91 volume 547 of LNCS pages 257--265. Springer Heidelberg 1991.","DOI":"10.1007\/3-540-46416-6_22"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"R.\n      Cramer\n     and \n      V.\n      Shoup\n  . \n  A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack\n  . In H. Krawczyk editor CRYPTO \n  1998 volume \n  1462\n   of \n  LNCS pages \n  13\n  --\n  25\n  . \n  Springer Heidelberg 1998.   R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk editor CRYPTO 1998 volume 1462 of LNCS pages 13--25. Springer Heidelberg 1998.","DOI":"10.1007\/BFb0055717"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539702403773"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"J.\n      Groth\n     and \n      A.\n      Sahai\n  . \n  Efficient non-interactive proof systems for bilinear groups\n  . In N. Smart editor EUROCRYPT \n  2008 volume \n  4965\n   of \n  LNCS pages \n  415\n  --\n  432\n  . \n  Springer Heidelberg 2008.   J. Groth and A. Sahai. Efficient non-interactive proof systems for bilinear groups. In N. Smart editor EUROCRYPT 2008 volume 4965 of LNCS pages 415--432. Springer Heidelberg 2008.","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"S.-H.\n      Heng\n     and \n      K.\n      Kurosawa\n  . \n  k-resilient identity-based encryption in the standard model\n  . In T. Okamoto editor CT-RSA \n  2004 volume \n  2964\n   of \n  LNCS pages \n  67\n  --\n  80\n  . \n  Springer Heidelberg 2004.  S.-H. Heng and K. Kurosawa. k-resilient identity-based encryption in the standard model. In T. Okamoto editor CT-RSA 2004 volume 2964 of LNCS pages 67--80. Springer Heidelberg 2004.","DOI":"10.1007\/978-3-540-24660-2_6"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36334-4_18"}],"event":{"name":"ASIA CCS '13: 8th ACM Symposium on Information, Computer and Communications Security","location":"Hangzhou China","acronym":"ASIA CCS '13","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484313.2484382","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2484313.2484382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:19Z","timestamp":1750235959000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484313.2484382"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,8]]},"references-count":13,"alternative-id":["10.1145\/2484313.2484382","10.1145\/2484313"],"URL":"https:\/\/doi.org\/10.1145\/2484313.2484382","relation":{},"subject":[],"published":{"date-parts":[[2013,5,8]]},"assertion":[{"value":"2013-05-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}