{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T07:01:05Z","timestamp":1763535665438,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union Horizon 2020","award":["779391 (Future-TPM)"],"award-info":[{"award-number":["779391 (Future-TPM)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3338511.3357349","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"23-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["A Framework for Efficient Lattice-Based DAA"],"prefix":"10.1145","author":[{"given":"Liqun","family":"Chen","sequence":"first","affiliation":[{"name":"University of Surrey, Guildford, United Kingdom"}]},{"given":"Nada","family":"El Kassem","sequence":"additional","affiliation":[{"name":"University of Surrey, Guildford, United Kingdom"}]},{"given":"Anja","family":"Lehmann","sequence":"additional","affiliation":[{"name":"IBM Research -- Zurich, Zurich, Switzerland"}]},{"given":"Vadim","family":"Lyubashevsky","sequence":"additional","affiliation":[{"name":"IBM Research -- Zurich, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"553","volume-title":"EUROCRYPT","author":"Agrawal Shweta","year":"2010","unstructured":"Shweta Agrawal , Dan Boneh , and Xavier Boyen . Efficient lattice (H)IBE in the standard model . In EUROCRYPT , pages 553 -- 572 , 2010 . Shweta Agrawal, Dan Boneh, and Xavier Boyen. Efficient lattice (H)IBE in the standard model. In EUROCRYPT, pages 553--572, 2010."},{"key":"e_1_3_2_1_2_1","first-page":"132","volume-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004","author":"Brickell Ernest F.","year":"2004","unstructured":"Ernest F. Brickell , Jan Camenisch , and Liqun Chen . Direct anonymous attestation. In Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors , Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004 , pages 132 -- 145 . ACM, 2004 . Ernest F. Brickell, Jan Camenisch, and Liqun Chen. Direct anonymous attestation. In Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, pages 132--145. ACM, 2004."},{"key":"e_1_3_2_1_3_1","series-title":"LNCS","volume-title":"ASIACRYPT (1)","author":"Benhamouda Fabrice","year":"2014","unstructured":"Fabrice Benhamouda , Jan Camenisch , Stephan Krenn , Vadim Lyubashevsky , and Gregory Neven . Better zero-knowledge proofs for lattice encryption and their application to group signatures . In ASIACRYPT (1) , volume 8873 of LNCS , 2014 . Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, and Gregory Neven. Better zero-knowledge proofs for lattice encryption and their application to group signatures. In ASIACRYPT (1), volume 8873 of LNCS, 2014."},{"key":"e_1_3_2_1_4_1","first-page":"166","volume-title":"First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008","author":"Brickell Ernie","year":"2008","unstructured":"Ernie Brickell , Liqun Chen , and Jiangtao Li . A new direct anonymous attestation scheme from bilinear maps. In Trusted Computing - Challenges and Applications , First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008 , Proceedings , pages 166 -- 178 , 2008 . Ernie Brickell, Liqun Chen, and Jiangtao Li. A new direct anonymous attestation scheme from bilinear maps. In Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pages 166--178, 2008."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0076-3"},{"key":"e_1_3_2_1_6_1","series-title":"LNCS","volume-title":"SCN","author":"Baum Carsten","year":"2018","unstructured":"Carsten Baum , Ivan Damg\u00e5rd , Vadim Lyubashevsky , Sabine Oechsner , and Chris Peikert . More efficient commitments from structured lattice assumptions . In SCN , volume 11035 of LNCS , 2018 . Carsten Baum, Ivan Damg\u00e5rd, Vadim Lyubashevsky, Sabine Oechsner, and Chris Peikert. More efficient commitments from structured lattice assumptions. In SCN, volume 11035 of LNCS, 2018."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0191-z"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04852-9_2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314337"},{"key":"e_1_3_2_1_14_1","volume-title":"Post-Quantum Cryptography","author":"Bettaieb Slim","year":"2015","unstructured":"Slim Bettaieb and Julien Schrek . Improved lattice-based threshold ring signature scheme . In Post-Quantum Cryptography , 2015 . Slim Bettaieb and Julien Schrek. Improved lattice-based threshold ring signature scheme. In Post-Quantum Cryptography, 2015."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.22"},{"key":"e_1_3_2_1_16_1","unstructured":"Jan Camenisch Manu Drijvers Alec Edgington Anja Lehmann Rolf Lindemann and Rainer Urian. FIDO ECDAA algorithm implementation draft. https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-id-20170202\/fido-ecdaa-algorithm-v1.1-id-20170202.html.  Jan Camenisch Manu Drijvers Alec Edgington Anja Lehmann Rolf Lindemann and Rainer Urian. FIDO ECDAA algorithm implementation draft. https:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-id-20170202\/fido-ecdaa-algorithm-v1.1-id-20170202.html."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45572-3_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49387-8_10"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63697-9_15"},{"key":"e_1_3_2_1_20_1","first-page":"223","volume-title":"CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings","author":"Chen Liqun","year":"2010","unstructured":"Liqun Chen , Dan Page , and Nigel P. Smart . On the design and implementation of an efficient DAA scheme. In Smart Card Research and Advanced Application, 9th IFIP WG 8.8\/11.2 International Conference , CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings , pages 223 -- 237 , 2010 . Liqun Chen, Dan Page, and Nigel P. Smart. On the design and implementation of an efficient DAA scheme. In Smart Card Research and Advanced Application, 9th IFIP WG 8.8\/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings, pages 223--237, 2010."},{"key":"e_1_3_2_1_21_1","first-page":"228","volume-title":"TRUST 2015, Heraklion, Greece, August 24-26, 2015","author":"Chen Liqun","year":"2015","unstructured":"Liqun Chen and Rainer Urian . DAA-A : direct anonymous attestation with attributes. In Trust and Trustworthy Computing - 8th International Conference , TRUST 2015, Heraklion, Greece, August 24-26, 2015 , Proceedings , pages 228 -- 245 , 2015 . Liqun Chen and Rainer Urian. DAA-A: direct anonymous attestation with attributes. In Trust and Trustworthy Computing - 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings, pages 228--245, 2015."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"e_1_3_2_1_23_1","series-title":"LNCS","volume-title":"ASIACRYPT (2)","author":"Ducas L\u00e9","year":"2014","unstructured":"L\u00e9 o Ducas , Vadim Lyubashevsky , and Thomas Prest . Efficient identity-based encryption over NTRU lattices . In ASIACRYPT (2) , volume 8874 of LNCS , 2014 . L\u00e9 o Ducas, Vadim Lyubashevsky, and Thomas Prest. Efficient identity-based encryption over NTRU lattices. In ASIACRYPT (2), volume 8874 of LNCS, 2014."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_19"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2930889.2930923"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243852"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-018-0417-1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25106-1_11"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"e_1_3_2_1_30_1","volume-title":"Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key","author":"International Organization for Standardization. ISO\/IEC 20008--2","year":"2013","unstructured":"International Organization for Standardization. ISO\/IEC 20008--2 : Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key , 2013 . International Organization for Standardization. ISO\/IEC 20008--2: Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key, 2013."},{"key":"e_1_3_2_1_31_1","volume-title":"Information technology - Trusted platform module library","author":"International Organization for Standardization. ISO\/IEC 11889","year":"2015","unstructured":"International Organization for Standardization. ISO\/IEC 11889 : Information technology - Trusted platform module library , 2015 . International Organization for Standardization. ISO\/IEC 11889: Information technology - Trusted platform module library, 2015."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.036"},{"key":"e_1_3_2_1_33_1","series-title":"LNCS","volume-title":"EUROCRYPT (3)","author":"Kiltz Eike","year":"2018","unstructured":"Eike Kiltz , Vadim Lyubashevsky , and Christian Schaffner . A concrete treatment of fiat-shamir signatures in the quantum random-oracle model . In EUROCRYPT (3) , volume 10822 of LNCS , 2018 . Eike Kiltz, Vadim Lyubashevsky, and Christian Schaffner. A concrete treatment of fiat-shamir signatures in the quantum random-oracle model. In EUROCRYPT (3), volume 10822 of LNCS, 2018."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_23"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_13"},{"key":"e_1_3_2_1_36_1","series-title":"LNCS","volume-title":"ICALP (2)","author":"Lyubashevsky Vadim","year":"2006","unstructured":"Vadim Lyubashevsky and Daniele Micciancio . Generalized compact knapsacks are collision resistant . In ICALP (2) , volume 4052 of LNCS , 2006 . Vadim Lyubashevsky and Daniele Micciancio. Generalized compact knapsacks are collision resistant. In ICALP (2), volume 4052 of LNCS, 2006."},{"key":"e_1_3_2_1_37_1","series-title":"LNCS","volume-title":"EUROCRYPT (1)","author":"Lyubashevsky Vadim","year":"2017","unstructured":"Vadim Lyubashevsky and Gregory Neven . One-shot verifiable encryption from lattices . In EUROCRYPT (1) , volume 10210 of LNCS , 2017 . Vadim Lyubashevsky and Gregory Neven. One-shot verifiable encryption from lattices. In EUROCRYPT (1), volume 10210 of LNCS, 2017."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_8"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_19"},{"key":"e_1_3_2_1_40_1","series-title":"LNCS","volume-title":"EUROCRYPT","author":"Lyubashevsky Vadim","year":"2010","unstructured":"Vadim Lyubashevsky , Chris Peikert , and Oded Regev . On ideal lattices and learning with errors over rings . In EUROCRYPT , volume 6110 of LNCS , 2010 . Vadim Lyubashevsky, Chris Peikert, and Oded Regev. On ideal lattices and learning with errors over rings. In EUROCRYPT, volume 6110 of LNCS, 2010."},{"key":"e_1_3_2_1_41_1","series-title":"LNCS","volume-title":"EUROCRYPT","author":"Lyubashevsky Vadim","year":"2012","unstructured":"Vadim Lyubashevsky . Lattice signatures without trapdoors . In EUROCRYPT , volume 7237 of LNCS , 2012 . Vadim Lyubashevsky. Lattice signatures without trapdoors. In EUROCRYPT, volume 7237 of LNCS, 2012."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008690"},{"key":"e_1_3_2_1_44_1","first-page":"13","volume-title":"CRYPTO","author":"Stern Jacques","year":"1993","unstructured":"Jacques Stern . A new identification scheme based on syndrome decoding . In CRYPTO , pages 13 -- 21 , 1993 . Jacques Stern. A new identification scheme based on syndrome decoding. In CRYPTO, pages 13--21, 1993."},{"key":"e_1_3_2_1_45_1","volume-title":"TPM main specification version 1.2","author":"Trusted Computing Group","year":"2004","unstructured":"Trusted Computing Group . TPM main specification version 1.2 , 2004 . Trusted Computing Group. TPM main specification version 1.2, 2004."},{"key":"e_1_3_2_1_46_1","volume-title":"Trusted platform module library specification, family \"2.0","author":"Trusted Computing Group","year":"2014","unstructured":"Trusted Computing Group . Trusted platform module library specification, family \"2.0 \", 2014 . Trusted Computing Group. Trusted platform module library specification, family \"2.0\", 2014."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2017.8275615"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08593-7_1"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338511.3357349","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338511.3357349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:46Z","timestamp":1750203886000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338511.3357349"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":44,"alternative-id":["10.1145\/3338511.3357349","10.1145\/3338511"],"URL":"https:\/\/doi.org\/10.1145\/3338511.3357349","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2019-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}