{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:09Z","timestamp":1750220049950,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1145\/3586102.3586110","type":"proceedings-article","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T04:57:37Z","timestamp":1690261057000},"page":"51-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Identity-based Linkable Blind Ring Signature Scheme on Lattice"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9266-3940","authenticated-orcid":false,"given":"Xue","family":"Liao","sequence":"first","affiliation":[{"name":"faculty of Information Technology, Beijing University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9191-964X","authenticated-orcid":false,"given":"Yihua","family":"Zhou","sequence":"additional","affiliation":[{"name":"faculty of Information Technology, Beijing University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0388-4998","authenticated-orcid":false,"given":"Jiawei","family":"Xu","sequence":"additional","affiliation":[{"name":"faculty of Information Technology, Beijing University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7240-1731","authenticated-orcid":false,"given":"Shuaikun","family":"Xing","sequence":"additional","affiliation":[{"name":"faculty of Information Technology, Beijing University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2707-1989","authenticated-orcid":false,"given":"Wei","family":"Zou","sequence":"additional","affiliation":[{"name":"faculty of Information Technology, Beijing University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2986-0368","authenticated-orcid":false,"given":"Jin","family":"Zhou","sequence":"additional","affiliation":[{"name":"faculty of Information Technology, Beijing University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8516-6945","authenticated-orcid":false,"given":"Qi","family":"Wang","sequence":"additional","affiliation":[{"name":"Trusted Computing Technology Co.LTD Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9812-1609","authenticated-orcid":false,"given":"Zhenhu","family":"Ning","sequence":"additional","affiliation":[{"name":"faculty of Information Technology, Beijing University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"August 19-22","author":"CHAUM D.","year":"1983","unstructured":"CHAUM D. 1983. Blind Signatures for Untraceablc Payments\/\/Springer. Advances in Cryptology , August 19-22 , 1983 , Boston, MA , USA. Heidelberg: Springer , 1983: 199-203. CHAUM D.1983. Blind Signatures for Untraceablc Payments\/\/Springer. Advances in Cryptology, August 19-22, 1983, Boston, MA, USA. Heidelberg: Springer, 1983: 199-203."},{"key":"e_1_3_2_1_2_1","first-page":"244","volume-title":"International Conference on the Theory and Application of Cryptology and Information Security","author":"ABE M","year":"1996","unstructured":"ABE M , FUJ 1SA K1 E . How to Date Blind Signatures\/\/Springer . International Conference on the Theory and Application of Cryptology and Information Security , November 3-7, 1996 , Berlin, Heidelberg, Germany. Heidelberg : Springer, 1996: 244 - 251 . ABE M, FUJ1SAK1 E. How to Date Blind Signatures\/\/Springer. International Conference on the Theory and Application of Cryptology and Information Security, November 3-7, 1996, Berlin, Heidelberg, Germany. Heidelberg: Springer, 1996: 244-251."},{"key":"e_1_3_2_1_3_1","volume-title":"Security Personal Learning Tools Using A Proxy Blind Signature Scheme. https:\/\/www.research gate.net\/publication\/239065774 Security personal learning tools using a proxy blind signature scheme","author":"LIN W D","year":"2020","unstructured":"LIN W D , JAN J K .2020. Security Personal Learning Tools Using A Proxy Blind Signature Scheme. https:\/\/www.research gate.net\/publication\/239065774 Security personal learning tools using a proxy blind signature scheme , 2020 .5.20. LIN W D, JAN J K.2020. Security Personal Learning Tools Using A Proxy Blind Signature Scheme. https:\/\/www.research gate.net\/publication\/239065774 Security personal learning tools using a proxy blind signature scheme, 2020.5.20."},{"volume-title":"Lattice-based hierarchical blind signature. HENAN SCIENCE, 35(3)","year":"2017","key":"e_1_3_2_1_4_1","unstructured":"Yinjuan Deng. 2017. Lattice-based hierarchical blind signature. HENAN SCIENCE, 35(3) ( 2017 ), 5. Yinjuan Deng. 2017. Lattice-based hierarchical blind signature. HENAN SCIENCE, 35(3) (2017), 5."},{"volume-title":"Identity-based against quantum attacks partially blind signature scheme from lattice. Netinfo Security, 18(3), 46-53","year":"2018","key":"e_1_3_2_1_5_1","unstructured":"Qing Y E, Jing Zhou, Yongli Tang, Junfeng Wang. ( 2018 ). Identity-based against quantum attacks partially blind signature scheme from lattice. Netinfo Security, 18(3), 46-53 . Qing Y E, Jing Zhou, Yongli Tang, Junfeng Wang. (2018). Identity-based against quantum attacks partially blind signature scheme from lattice. Netinfo Security, 18(3), 46-53."},{"key":"e_1_3_2_1_6_1","first-page":"37","volume-title":"Netinfo Security","year":"2021","unstructured":"Yihua Zhou, Songshou Dong, Yuguang Yang.(2021). A Lattice-based Identity-based Proxy Partially Blind Signature Scheme in the Standard Model . Netinfo Security , 2021 , 21(3): 37 - 43 . Yihua Zhou, Songshou Dong, Yuguang Yang.(2021). A Lattice-based Identity-based Proxy Partially Blind Signature Scheme in the Standard Model. Netinfo Security, 2021, 21(3): 37-43."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3969\/j.issn.2096-9473.2021.04.007"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.13868\/j.cnki.jcr.000447]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.19734\/j.issn.1001-3695.2022.02.0057"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.19734\/j.issn.1001-3695.2022.03.0103"},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on the Theory and Application of Cryptology and Information Security.","author":"K.","year":"2002","unstructured":"Abe M., Ohkubo M., Suzuki K. 1-out-of-n Signatures from a Variety of Keys . International Conference on the Theory and Application of Cryptology and Information Security. Berlin : Springer , 2002 : 415-432 Abe M., Ohkubo M., Suzuki K. 1-out-of-n Signatures from a Variety of Keys. International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2002: 415-432"},{"key":"e_1_3_2_1_13_1","volume-title":"Lattice Signatures and Bimodal Gaussians . Annual Cryptology Conference","author":"T.","year":"2013","unstructured":"Ducas L., Durmus A., Lepoint T. , Lattice Signatures and Bimodal Gaussians . Annual Cryptology Conference . Berlin : Springer , 2013 : 40-56 Ducas L., Durmus A., Lepoint T., Lattice Signatures and Bimodal Gaussians . Annual Cryptology Conference. Berlin: Springer, 2013: 40-56"},{"key":"e_1_3_2_1_14_1","volume-title":"Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT vl.0). Australasian Conference on Infomiation Security and Privacy","author":"A.","year":"2018","unstructured":"Torres W. A. A., Steinffeld R., Sakzad A. , Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT vl.0). Australasian Conference on Infomiation Security and Privacy . Cham : Springer , 2018 : 558-576 Torres W. A. A., Steinffeld R., Sakzad A., Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT vl.0). Australasian Conference on Infomiation Security and Privacy. Cham: Springer, 2018: 558-576"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.13868\/j.cnki.jcr.000433]"},{"key":"e_1_3_2_1_16_1","unstructured":"Lili Zhang Yanqin Ma. A lattice-based Identity-based Proxy Blind Signature Scheme in the Standard Model. https:\/\/downloads.hindawi.eom\/journals\/mpe\/2014\/307637.pdf. 2020-05-12.  Lili Zhang Yanqin Ma. A lattice-based Identity-based Proxy Blind Signature Scheme in the Standard Model. https:\/\/downloads.hindawi.eom\/journals\/mpe\/2014\/307637.pdf. 2020-05-12."},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"Languages and Programming","author":"AJTAI M.","year":"1999","unstructured":"AJTAI M. Generating Hard Instances of the Short Basis Problem\/\/ Springer. International Colloquium on Automata , Languages and Programming , July 11-15, 1999 , Berlin, Heidelberg, German. Heidelberg : Springer, 1999: 1 - 9 . AJTAI M. Generating Hard Instances of the Short Basis Problem\/\/ Springer. International Colloquium on Automata, Languages and Programming, July 11-15, 1999, Berlin, Heidelberg, German. Heidelberg: Springer, 1999: 1-9."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539705447360"},{"issue":"6","key":"e_1_3_2_1_19_1","first-page":"774","article-title":"Asymptotically Efficient Lattice-based Digital Signatures","volume":"31","author":"LYUBASHEVSKY V","year":"2008","unstructured":"LYUBASHEVSKY V , MICCIANCIO D . Asymptotically Efficient Lattice-based Digital Signatures . Journal of Cryptology , 2008 , 31 ( 6 ): 774 - 797 . LYUBASHEVSKY V, MICCIANCIO D. Asymptotically Efficient Lattice-based Digital Signatures. Journal of Cryptology, 2008, 31(6): 774-797.","journal-title":"Journal of Cryptology"},{"key":"e_1_3_2_1_20_1","first-page":"205","volume-title":"International Conference on Information Security and Cryptology","author":"GAO","year":"2016","unstructured":"GAO Wen, HU Yupu, WANG Baocang, Identity-based Blind Signature from Lattices in Standard Model\/\/Springer. International Conference on Information Security and Cryptology , November 4-6, 2016 , Cham, Switzerland. Heidelberg : Springer, 2016: 205 - 218 . GAO Wen, HU Yupu, WANG Baocang, Identity-based Blind Signature from Lattices in Standard Model\/\/Springer. International Conference on Information Security and Cryptology, November 4-6, 2016, Cham, Switzerland. Heidelberg: Springer, 2016: 205-218."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.10.031]"},{"key":"e_1_3_2_1_22_1","volume-title":"Towards practical lattice-based one-time linkable ring signature. IACR Cryptology ePrint Archive","author":"BAUM C","year":"2018","unstructured":"BAUM C , LIN H , OECHSNER S. Towards practical lattice-based one-time linkable ring signature. IACR Cryptology ePrint Archive , 2018 : 2018\/857. http:\/\/eprint.iacr.org\/2018\/857.pdf BAUM C, LIN H, OECHSNER S. Towards practical lattice-based one-time linkable ring signature. IACR Cryptology ePrint Archive, 2018: 2018\/857. http:\/\/eprint.iacr.org\/2018\/857.pdf"}],"event":{"name":"ICCNS 2022: 2022 the 12th International Conference on Communication and Network Security","acronym":"ICCNS 2022","location":"Beijing China"},"container-title":["Proceedings of the 2022 12th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3586102.3586110","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3586102.3586110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:11Z","timestamp":1750183691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3586102.3586110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":22,"alternative-id":["10.1145\/3586102.3586110","10.1145\/3586102"],"URL":"https:\/\/doi.org\/10.1145\/3586102.3586110","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"2023-07-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}