{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:14Z","timestamp":1750306634623,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,3]],"date-time":"2014-06-03T00:00:00Z","timestamp":1401753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["25540004"],"award-info":[{"award-number":["25540004"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,3]]},"DOI":"10.1145\/2600694.2600696","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"49-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Attribute-based signatures without pairings via the fiat-shamir paradigm"],"prefix":"10.1145","author":[{"given":"Hiroaki","family":"Anada","sequence":"first","affiliation":[{"name":"Institute of Systems, Information Technologies and Nanotechnologies (ISIT), Fukuoka, Japan"}]},{"given":"Seiko","family":"Arita","sequence":"additional","affiliation":[{"name":"Institute of Information Security (IISEC), Yokohama, Japan"}]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]}],"member":"320","published-online":{"date-parts":[[2014,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"LNCS","first-page":"418","volume-title":"EUROCRYPT","author":"Abdalla M.","year":"2002","unstructured":"M. Abdalla , J. H. An , M. Bellare , and C. Namprempre . From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security . In EUROCRYPT 2002 , volume 2332 of LNCS , pages 418 -- 433 . Springer . M. Abdalla, J. H. An, M. Bellare, and C. Namprempre. From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. In EUROCRYPT 2002, volume 2332 of LNCS, pages 418--433. Springer."},{"key":"e_1_3_2_1_2_1","series-title":"LNCS","first-page":"168","volume-title":"ACISP","author":"Anada H.","year":"2013","unstructured":"H. Anada , S. Arita , S. Handa , and Y. Iwabuchi . Attribute-Based Identification: Definitions and Efficient Constructions . In ACISP 2013 , volume 7959 of LNCS , pages 168 -- 186 . Springer . H. Anada, S. Arita, S. Handa, and Y. Iwabuchi. Attribute-Based Identification: Definitions and Efficient Constructions. In ACISP 2013, volume 7959 of LNCS, pages 168--186. Springer."},{"key":"e_1_3_2_1_4_1","series-title":"LNCS","first-page":"390","volume-title":"CRYPTO '92","author":"Bellare M.","unstructured":"M. Bellare and O. Goldreich . On Defining Proofs of Knowledge . In CRYPTO '92 , volume 740 of LNCS , pages 390 -- 420 . Springer . M. Bellare and O. Goldreich. On Defining Proofs of Knowledge. In CRYPTO '92, volume 740 of LNCS, pages 390--420. Springer."},{"key":"e_1_3_2_1_5_1","series-title":"LNCS","first-page":"162","volume-title":"CRYPTO","author":"Bellare M.","year":"2002","unstructured":"M. Bellare and A. Palacio . GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks . In CRYPTO 2002 , volume 2442 of LNCS , pages 162 -- 177 . Springer . M. Bellare and A. Palacio. GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. In CRYPTO 2002, volume 2442 of LNCS, pages 162--177. Springer."},{"key":"e_1_3_2_1_6_1","series-title":"LNCS","first-page":"223","volume-title":"EUROCRYPT","author":"Boneh D.","year":"2004","unstructured":"D. Boneh and X. Boyen . Efficient Selective-ID Secure Identity-Based Encryption without Random Oracles . In EUROCRYPT 2004 , volume 3027 of LNCS , pages 223 -- 238 . Springer . D. Boneh and X. Boyen. Efficient Selective-ID Secure Identity-Based Encryption without Random Oracles. In EUROCRYPT 2004, volume 3027 of LNCS, pages 223--238. Springer."},{"key":"e_1_3_2_1_7_1","series-title":"LNCS","first-page":"280","volume-title":"EUROCRYPT","author":"Cramer R.","year":"2001","unstructured":"R. Cramer , I. Damg\\rard, and J. B. Nielsen . Multiparty Computation from Threshold Homomorphic Encryption . In EUROCRYPT 2001 , volume 2045 of LNCS , pages 280 -- 300 . Springer . R. Cramer, I. Damg\\rard, and J. B. Nielsen. Multiparty Computation from Threshold Homomorphic Encryption. In EUROCRYPT 2001, volume 2045 of LNCS, pages 280--300. Springer."},{"key":"e_1_3_2_1_8_1","unstructured":"I. Damgard. On sgm-protocols. In Course Notes http:\/\/www.daimi.au.dk\/ ivan\/Sigma.ps 2004.  I. Damgard. On sgm-protocols. In Course Notes http:\/\/www.daimi.au.dk\/ ivan\/Sigma.ps 2004."},{"key":"e_1_3_2_1_9_1","series-title":"LNCS","first-page":"186","volume-title":"CRYPTO '86","author":"Fiat A.","unstructured":"A. Fiat and A. Shamir . How to Prove Yourself: Practical Solutions to Identification and Signature Problems . In CRYPTO '86 , volume 263 of LNCS , pages 186 -- 194 . Springer . A. Fiat and A. Shamir. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO '86, volume 263 of LNCS, pages 186--194. Springer."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISA.2008.111"},{"key":"e_1_3_2_1_12_1","volume-title":"Introduction to Modern Cryptography","author":"Katz J.","year":"2008","unstructured":"J. Katz and Y. Lindell . Introduction to Modern Cryptography . Chapman and Hall\/CRC , 2008 . J. Katz and Y. Lindell. Introduction to Modern Cryptography. Chapman and Hall\/CRC, 2008."},{"key":"e_1_3_2_1_13_1","series-title":"LNCS","first-page":"376","volume-title":"CT-RSA","author":"Maji H. K.","year":"2011","unstructured":"H. K. Maji , M. Prabhakaran , and M. Rosulek . Attribute-Based Signatures . In CT-RSA 2011 , volume 6558 of LNCS , pages 376 -- 392 . Springer . H. K. Maji, M. Prabhakaran, and M. Rosulek. Attribute-Based Signatures. In CT-RSA 2011, volume 6558 of LNCS, pages 376--392. Springer."},{"key":"e_1_3_2_1_14_1","series-title":"LNCS","first-page":"35","volume-title":"PKC","author":"Okamoto T.","year":"2011","unstructured":"T. Okamoto and K. Takashima . Efficient Attribute-Based Signatures for Non-monotone Predicates in the standard model . In PKC 2011 , volume 6571 of LNCS , pages 35 -- 52 . Springer . T. Okamoto and K. Takashima. Efficient Attribute-Based Signatures for Non-monotone Predicates in the standard model. In PKC 2011, volume 6571 of LNCS, pages 35--52. Springer."},{"key":"e_1_3_2_1_15_1","series-title":"LNCS","first-page":"239","volume-title":"CRYPTO '89","author":"Schnorr C. P.","unstructured":"C. P. Schnorr . Efficient Identification and Signatures for Smart cards . In CRYPTO '89 , volume 435 of LNCS , pages 239 -- 252 . Springer . C. P. Schnorr. Efficient Identification and Signatures for Smart cards. In CRYPTO '89, volume 435 of LNCS, pages 239--252. Springer."}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 2nd ACM workshop on ASIA public-key cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600694.2600696","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600694.2600696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:52Z","timestamp":1750229752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600694.2600696"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,3]]},"references-count":14,"alternative-id":["10.1145\/2600694.2600696","10.1145\/2600694"],"URL":"https:\/\/doi.org\/10.1145\/2600694.2600696","relation":{},"subject":[],"published":{"date-parts":[[2014,6,3]]},"assertion":[{"value":"2014-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}