{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T23:07:54Z","timestamp":1774652874894,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172412"],"award-info":[{"award-number":["62172412"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"AXA Research Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Research Grants Council, University Grants Committee","doi-asserted-by":"publisher","award":["17201421, C1029-22G, R1012-21"],"award-info":[{"award-number":["17201421, C1029-22G, R1012-21"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690261","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"899-913","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Direct Range Proofs for Paillier Cryptosystem and Their Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8370-5396","authenticated-orcid":false,"given":"Zhikang","family":"Xie","sequence":"first","affiliation":[{"name":"The University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5854-9085","authenticated-orcid":false,"given":"Mengling","family":"Liu","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0173-7894","authenticated-orcid":false,"given":"Haiyang","family":"Xue","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2068-9530","authenticated-orcid":false,"given":"Man Ho","family":"Au","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3491-8146","authenticated-orcid":false,"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3975-8500","authenticated-orcid":false,"given":"Siu-Ming","family":"Yiu","sequence":"additional","affiliation":[{"name":"The University of Hong Kong, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756169.1756212"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313276.3316380"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423367"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45388-6_10"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054154"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77883-5_9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_11"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36178-2_8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44586-2_9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75245-3_24"},{"key":"e_1_3_2_1_14_1","volume-title":"IACR International Conference on Public-Key Cryptography","author":"Devevey Julien","unstructured":"Julien Devevey, Beno^it Libert, and Thomas Peters. 2022. Rational Modular Encoding in the DCR Setting: Non-Interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model. In IACR International Conference on Public-Key Cryptography. Springer, 615--646."},{"key":"e_1_3_2_1_15_1","volume-title":"Threshold ECDSA in Three Rounds. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 174--174","author":"Doerner Jack","year":"2024","unstructured":"Jack Doerner, Yashvanth Kondi, Eysa Lee, et al. 2024. Threshold ECDSA in Three Rounds. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 174--174."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00036"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00024"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings 13","author":"Faust Sebastian","year":"2012","unstructured":"Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, and Daniele Venturi. 2012. On the non-malleability of the Fiat-Shamir transform. In Progress in Cryptology-INDOCRYPT 2012: 13th International Conference on Cryptology in India, Kolkata, India, December 9--12, 2012. Proceedings 13. Springer, 60--79."},{"key":"e_1_3_2_1_19_1","volume-title":"Conference on the theory and application of cryptographic techniques. Springer, 186--194","author":"Fiat Amos","year":"1986","unstructured":"Amos Fiat and Adi Shamir. 1986. How to prove yourself: Practical solutions to identification and signature problems. In Conference on the theory and application of cryptographic techniques. Springer, 186--194."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_21"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052225"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243859"},{"key":"e_1_3_2_1_23_1","volume-title":"Efficient Zero-Knowledge Arguments For Paillier Cryptosystem. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 93--93","author":"Gong Borui","year":"2024","unstructured":"Borui Gong, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, and Lichun Li. 2024. Efficient Zero-Knowledge Arguments For Paillier Cryptosystem. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 93--93."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496137_32"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_23"},{"key":"e_1_3_2_1_26_1","unstructured":"ISO\/IEC. 2019. ISO\/IEC 18033--6:2019 IT Security techniques ? Encryption algorithms ? Part 6: Homomorphic encryption. https:\/\/www.iso.org\/standard\/67740.html"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27809-2_9"},{"key":"e_1_3_2_1_28_1","volume-title":"Zero-Knowledge Arguments for Subverted RSA Groups. In IACR International Conference on Public-Key Cryptography. Springer, 512--541","author":"Kolonelos Dimitris","year":"2023","unstructured":"Dimitris Kolonelos, Mary Maller, and Mikhail Volkhov. 2023. Zero-Knowledge Arguments for Subverted RSA Groups. In IACR International Conference on Public-Key Cryptography. Springer, 512--541."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings, Part II 37","author":"Lindell Yehuda","year":"2017","unstructured":"Yehuda Lindell. 2017. Fast secure two-party ECDSA signing. In Advances in Cryptology--CRYPTO 2017: 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20--24, 2017, Proceedings, Part II 37. Springer, 613--644."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243788"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_26"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36504-4_7"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100273"},{"key":"e_1_3_2_1_34_1","unstructured":"NIST. 2024. Multi-Party Threshold Cryptography. https:\/\/csrc.nist.gov\/Projects\/threshold-cryptography"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417263"},{"key":"e_1_3_2_1_37_1","volume-title":"Robert H Deng, and Siu-Ming Yiu.","author":"Xie Zhikang","year":"2024","unstructured":"Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H Deng, and Siu-Ming Yiu. 2024. Direct Range Proofs for Paillier Cryptosystem and Their Applications. Cryptology ePrint Archive (2024)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616595"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484803"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690261","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:21:55Z","timestamp":1755843715000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690261"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":39,"alternative-id":["10.1145\/3658644.3690261","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690261","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}